메뉴 건너뛰기




Volumn 10, Issue 1, 2013, Pages 28-39

The foundational work of harrison-ruzzo-ullman revisited

Author keywords

Access control; computational complexity; reducibility and completeness

Indexed keywords

COMPUTATIONAL COMPLEXITY; ERRORS; MAPPING;

EID: 84872049019     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2012.77     Document Type: Article
Times cited : (19)

References (34)
  • 2
    • 84974776848 scopus 로고
    • The Extended schematic protection model
    • P. Ammann and R.S. Sandhu, "The Extended Schematic Protection Model," J. Computer Security, vol. 1, nos. 3/4, pp. 335-383, 1992.
    • (1992) J. Computer Security , vol.1 , Issue.3-4 , pp. 335-383
    • Ammann, P.1    Sandhu, R.S.2
  • 7
    • 26844544427 scopus 로고
    • Safety in Grammatical protection systems
    • T. Budd, "Safety in Grammatical Protection Systems," Int'l J. Computer and Information Sciences, vol. 12, no. 6, pp. 413-430, 1983.
    • (1983) Int'l J. Computer and Information Sciences , vol.12 , Issue.6 , pp. 413-430
    • Budd, T.1
  • 9
    • 0004238984 scopus 로고
    • First Ed. Addison-Wesley Longman Publishing Co, Inc
    • D. Denning, Cryptography and Data Security, first ed. Addison-Wesley Longman Publishing Co., Inc., 1982.
    • (1982) Cryptography Data Security
    • Denning, D.1
  • 11
    • 33746634173 scopus 로고    scopus 로고
    • Google Inc May
    • Google, Inc., "Google Scholar," http://scholar.google.com/, May 2005.
    • (2005) Google Scholar
  • 13
    • 0009442659 scopus 로고
    • Monotonic protection systems
    • R.A. DeMillo, D.P. Dobkin, A.K. Jones, and R.J. Lipton, ed Academic Press, Inc
    • M.A. Harrison and W.L. Ruzzo, "Monotonic Protection Systems," Foundations of Secure Computation, R.A. DeMillo, D.P. Dobkin, A.K. Jones, and R.J. Lipton, ed., pp. 461-471, Academic Press, Inc., 1978.
    • (1978) Foundations of Secure Computation , pp. 461-471
    • Harrison, M.A.1    Ruzzo, W.L.2
  • 14
    • 0016984825 scopus 로고
    • Protection in Operating Systems
    • Aug
    • M.A. Harrison, W.L. Ruzzo, and J.D. Ullman, "Protection in Operating Systems," Comm. ACM, vol. 19, no. 8, pp. 461-471, Aug. 1976.
    • (1976) Comm. ACM , vol.19 , Issue.8 , pp. 461-471
    • Harrison, M.A.1    Ruzzo, W.L.2    Ullman, J.D.3
  • 17
    • 0003037529 scopus 로고
    • Reducibility among combinatorial problems
    • R.E. Miller and J.W. Thatcher, ed Plenum Press
    • R.M. Karp, "Reducibility among Combinatorial Problems," Complexity of Computer Computations, R.E. Miller and J.W. Thatcher, ed., pp. 85-103, Plenum Press, 1972.
    • (1972) Complexity of Computer Computations , pp. 85-103
    • Karp, R.M.1
  • 19
  • 20
    • 30544438141 scopus 로고    scopus 로고
    • Beyond proof-of-compliance: Security analysis in trust management
    • N. Li, J.C. Mitchell, and W.H. Winsborough, "Beyond Proof-of-Compliance: Security Analysis in Trust Management," J. ACM, vol. 52, pp. 474-514, 2004.
    • (2004) J. ACM , vol.52 , pp. 474-514
    • Li, N.1    Mitchell, J.C.2    Winsborough, W.H.3
  • 22
    • 0038825043 scopus 로고    scopus 로고
    • Beyond proof-of-compliance: Safety and availability analysis in trust management
    • May
    • N. Li, W.H. Winsborough, and J.C. Mitchell, "Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management," Proc. IEEE Symp. Security and Privacy, pp. 123-139, May 2003.
    • (2003) Proc. IEEE Symp. Security and Privacy , pp. 123-139
    • Li, N.1    Winsborough, W.H.2    Mitchell, J.C.3
  • 23
    • 0017512599 scopus 로고
    • Linear time algorithm for deciding subject security
    • R.J. Lipton and L. Snyder, "A Linear Time Algorithm for Deciding Subject Security," J. ACM, vol. 24, no. 3, pp. 455-464, 1977. (Pubitemid 8549592)
    • (1977) J Assoc Comput Mach , vol.24 , Issue.3 , pp. 455-464
    • Lipton, R.J.1    Snyder, L.2
  • 24
    • 84976701444 scopus 로고
    • Selective and locally controlled transport of privileges
    • Oct
    • N.H. Minsky, "Selective and Locally Controlled Transport Of Privileges," ACM Trans. Programming Languages and Systems, vol. 6, no. 4, pp. 573-602, Oct. 1984.
    • (1984) ACM Trans. Programming Languages and Systems , vol.6 , Issue.4 , pp. 573-602
    • Minsky, N.H.1
  • 28
    • 0023999796 scopus 로고
    • The Schematic protection model: Its definition and analysis for acyclic attenuating systems
    • R.S. Sandhu, "The Schematic Protection Model: Its Definition and Analysis for Acyclic Attenuating Systems," J. ACM, vol. 35, no. 2, pp. 404-432, 1988.
    • (1988) J. ACM , vol.35 , Issue.2 , pp. 404-432
    • Sandhu, R.S.1
  • 29
    • 84974744165 scopus 로고
    • Expressive power of the schematic protection model
    • R.S. Sandhu, "Expressive Power of the Schematic Protection Model," J. Computer Security, vol. 1, no. 1, pp. 59-98, 1992.
    • (1992) J. Computer Security , vol.1 , Issue.1 , pp. 59-98
    • Sandhu, R.S.1
  • 31
    • 0026819359 scopus 로고
    • Undecidability of the safety problem for the schematic protection model with cyclic creates
    • Feb
    • R.S. Sandhu, "Undecidability of the Safety Problem for the Schematic Protection Model with Cyclic Creates," J. Computer and System Sciences, vol. 44, no. 1, pp. 141-159, Feb. 1992.
    • (1992) J. Computer and System Sciences , vol.44 , Issue.1 , pp. 141-159
    • Sandhu, R.S.1
  • 34
    • 0842288709 scopus 로고    scopus 로고
    • The Dynamic-typed access matrix model and decidability of the safety problem
    • Jan
    • M. Soshi, M. Maekawa, and E. Okamoto, "The Dynamic-Typed Access Matrix Model and Decidability of the Safety Problem," IEICE Trans. Fundamentals, vol. E87-A, no. 1, pp. 190-203, Jan. 2004.
    • (2004) IEICE Trans. Fundamentals , vol.E87-A , Issue.1 , pp. 190-203
    • Soshi, M.1    Maekawa, M.2    Okamoto, E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.