메뉴 건너뛰기




Volumn 33, Issue , 2007, Pages 21-58

Access Control Policies and Languages in Open Environments

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84875664448     PISSN: 15682633     EISSN: None     Source Type: Book Series    
DOI: None     Document Type: Chapter
Times cited : (21)

References (53)
  • 4
    • 78649235952 scopus 로고
    • Modeling the multipolicy machine
    • In Little Compton, Rhode Island, USA
    • Bell D (1994). Modeling the multipolicy machine. In Proc. of the New Security Paradigm Workshop, Little Compton, Rhode Island, USA.
    • (1994) Proc. of the New Security Paradigm Workshop
    • Bell, D.1
  • 5
  • 7
    • 0040884892 scopus 로고    scopus 로고
    • A flexible authorization mechanism for relational data management systems
    • Bertino E, Jajodia S, Samarati P (1999). A flexible authorization mechanism for relational data management systems. ACM Transactions on Information Systems, 17(2):101-140.
    • (1999) ACM Transactions on Information Systems , vol.17 , Issue.2 , pp. 101-140
    • Bertino, E.1    Jajodia, S.2    Samarati, P.3
  • 10
    • 0036311802 scopus 로고    scopus 로고
    • A unified framework for regulating access and information release on the web
    • Bonatti P, Samarati P (2002). A unified framework for regulating access and information release on the web. Journal of Computer Security, 10(3):241-272.
    • (2002) Journal of Computer Security , vol.10 , Issue.3 , pp. 241-272
    • Bonatti, P.1    Samarati, P.2
  • 17
    • 33745883651 scopus 로고    scopus 로고
    • extensible Access Control Markup Language (XACML) Version 2.0, Version 2.0. OASIS
    • extensible Access Control Markup Language (XACML) Version 2.0 (2004). extensible Access Control Markup Language (XACML) Version 2.0. OASIS. http://www.oasisopen. org/committees/xacml.
    • (2004) extensible Access Control Markup Language (XACML)
  • 20
    • 33646837004 scopus 로고    scopus 로고
    • An authorization model for XML databases
    • In George Mason University, Fairfax, VA, USA
    • Gabillon A (2004). An authorization model for XML databases. In Proc. of the ACM Workshop Secure Web Services, George Mason University, Fairfax, VA, USA.
    • (2004) Proc. of the ACM Workshop Secure Web Services
    • Gabillon, A.1
  • 25
    • 84983002492 scopus 로고    scopus 로고
    • Access control in configurable systems
    • Jaeger T (2001). Access control in configurable systems. Lecture Notes in Computer Science, 1603:289-3 16.
    • (2001) Lecture Notes in Computer Science , vol.1603 , pp. 289-316
    • Jaeger, T.1
  • 29
    • 24644440247 scopus 로고    scopus 로고
    • Access control specification based on policy evaluation and enforcement model and specification language
    • In (SCIS'2000), Japan
    • Kudoh M, Hirayama Y, Hada S, Vollschwitz A (2000). Access control specification based on policy evaluation and enforcement model and specification language. In Symposium on Cryptograpy and Information Security (SCIS'2000), Japan.
    • (2000) Symposium on Cryptograpy and Information Security
    • Kudoh, M.1    Hirayama, Y.2    Hada, S.3    Vollschwitz, A.4
  • 30
    • 0019608720 scopus 로고
    • Formal models for computer security
    • Landwehr CF (1981). Formal models for computer security. ACM Computing Surveys, 13(3):247-278.
    • (1981) ACM Computing Surveys , vol.13 , Issue.3 , pp. 247-278
    • Landwehr, C.F.1
  • 39
    • 19544394549 scopus 로고    scopus 로고
    • (SAML) V1.l. Security Assertion Markup Language SAMLJ V1.l. OASIS
    • Security Assertion Markup Language (SAML) V1. l (2003). Security Assertion Markup Language (SAMLJ V1.l. OASIS. http://www.oasis-open.org/committees/security/.
    • (2003) Security Assertion Markup Language
  • 42
    • 84882597160 scopus 로고    scopus 로고
    • The XACML Profile for Hierarchical Resources. OASIS
    • The XACML Profile for Hierarchical Resources (2004). The XACML Profile for Hierarchical Resources. OASIS. http:Nwww.oasis-38930pen.org/committees/xacml.
    • (2004) The XACML Profile for Hierarchical Resources.
  • 44
    • 4544323391 scopus 로고    scopus 로고
    • Web services security policy (WS-SecurityPolicy)
    • Web services security policy (WS-SecurityPolicy) (2002). Web services security policy (WS-SecurityPolicy). http:Nwww-106.ibm.com/developerworks/library/ws-secpo/.
    • (2002) Web services security policy (WS-SecurityPolicy)
  • 48
    • 84974750564 scopus 로고
    • Authorizations indistributed systems: A new approach
    • Woo TYC, Lam SS (1993). Authorizations indistributed systems: A new approach. Journal of Computer Security, 2(2,3):107-136.
    • (1993) Journal of Computer Security , vol.2 , Issue.2-3 , pp. 107-136
    • Woo, T.Y.C.1    Lam, S.S.2
  • 49
    • 0004135793 scopus 로고    scopus 로고
    • extensible Markup Language (XML) 1.0 (Third Edition). World Wide Web Consortium (W3C)
    • World Wide Web Consortium (W3C) (2004). extensible Markup Language (XML) 1.0 (Third Edition). World Wide Web Consortium (W3C). http://www.w3.org/TR/REC-xml.
    • (2004) World Wide Web Consortium (W3C)
  • 51
    • 84954418287 scopus 로고    scopus 로고
    • A unified scheme for resource protection in automated trust negotiation
    • In Berkeley, California
    • Yu T, Winslett M (2003). A unified scheme for resource protection in automated trust negotiation. In Proc, of the IEEE Symposium on Security and Privacy, Berkeley, California.
    • (2003) Proc, of the IEEE Symposium on Security and Privacy
    • Yu, T.1    Winslett, M.2
  • 53
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies trough interoperable strategies for automated trust
    • Yu T, Winslett M, Seamons KE (2003). Supporting structured credentials and sensitive policies trough interoperable strategies for automated trust. ACM Transactions on Information and System Security, 6(1):1-42.
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.