메뉴 건너뛰기




Volumn , Issue , 2013, Pages 61-72

Model-driven adaptive delegation

Author keywords

Access control; Delegation; Dynamic adaptation; Model composition; Model driven engineering; Model driven security

Indexed keywords

DELEGATION; DYNAMIC ADAPTATIONS; MODEL COMPOSITION; MODEL-DRIVEN ENGINEERING; MODEL-DRIVEN SECURITIES;

EID: 84875987068     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2451436.2451445     Document Type: Conference Paper
Times cited : (7)

References (27)
  • 1
    • 33750534177 scopus 로고    scopus 로고
    • Towards secure information sharing using role-based delegation
    • Jan.
    • G.-J. Ahn, B. Mohan, and S.-P. Hong. Towards secure information sharing using role-based delegation. J. Netw. Comput. Appl., 30(1):42{59, Jan. 2007.
    • (2007) J. Netw. Comput. Appl. , vol.30 , Issue.1 , pp. 42-59
    • Ahn, G.-J.1    Mohan, B.2    Hong, S.-P.3
  • 3
    • 33746684330 scopus 로고    scopus 로고
    • Term rewriting for access control
    • S. Barker and M. Fernández. Term rewriting for access control. In DBSec, pages 179{193, 2006.
    • (2006) DBSec , pp. 179-193
    • Barker, S.1    Fernández, M.2
  • 4
    • 33745471209 scopus 로고    scopus 로고
    • Model driven security: From UML models to access control infrastructures
    • D. Basin and J. Doser. Model driven security: From UML models to access control infrastructures. ACM Transactions on Software, (1945):353{398, 2006.
    • (2006) ACM Transactions on Software , Issue.1945 , pp. 353-398
    • Basin, D.1    Doser, J.2
  • 6
    • 0040884892 scopus 로고    scopus 로고
    • A exible authorization mechanism for relational data management systems
    • E. Bertino, S. Jajodia, and P. Samarati. A exible authorization mechanism for relational data management systems. ACM Trans. Inf. Syst., 17(2):101{140, 1999.
    • (1999) ACM Trans. Inf. Syst. , vol.17 , Issue.2 , pp. 101-140
    • Bertino, E.1    Jajodia, S.2    Samarati, P.3
  • 7
    • 37849037811 scopus 로고    scopus 로고
    • Dynamic event-based access control as term rewriting
    • C. Bertolissi, M. Fernández, and S. Barker. Dynamic event-based access control as term rewriting. In DBSec, pages 195{210, 2007.
    • (2007) DBSec , pp. 195-210
    • Bertolissi, C.1    Fernández, M.2    Barker, S.3
  • 9
    • 41849110585 scopus 로고    scopus 로고
    • Delegation in role-based access control
    • J. Crampton and H. Khambhammettu. Delegation in role-based access control. Int. J. Inf. Sec., 7(2):123{136, 2008.
    • (2008) Int. J. Inf. Sec. , vol.7 , Issue.2 , pp. 123-136
    • Crampton, J.1    Khambhammettu, H.2
  • 12
    • 79955163100 scopus 로고    scopus 로고
    • UMLsec: Extending UML for secure systems development
    • Dresden, Germany, Springer-Verlag
    • J. Jürjens. UMLsec: Extending UML for Secure Systems Development. In UML'02: 5th International Conference on The UML, pages 412{425, Dresden, Germany, 2002. Springer-Verlag.
    • (2002) UML'02: 5th International Conference on the UML , pp. 412-425
    • Jürjens, J.1
  • 13
    • 33144472884 scopus 로고    scopus 로고
    • Modeling role-based access control using parameterized uml models
    • D.-K. Kim, I. Ray, R. B. France, and N. Li. Modeling role-based access control using parameterized uml models. In FASE, pages 180{193, 2004.
    • (2004) FASE , pp. 180-193
    • Kim, D.-K.1    Ray, I.2    France, R.B.3    Li, N.4
  • 14
    • 84876008007 scopus 로고    scopus 로고
    • Xpand: A closer look at the model2text transformation language
    • (10/16/2008)
    • B. Klatt. Xpand: A closer look at the model2text transformation language. Language, (10/16/2008), 2007.
    • (2007) Language
    • Klatt, B.1
  • 15
    • 79955143136 scopus 로고    scopus 로고
    • SecureUML: A UML-based modeling language for model-driven security
    • Dresden, Germany, Springer-Verlag
    • T. Lodderstedt, D. Basin, and J. Doser. SecureUML: A UML-Based Modeling Language for Model-Driven Security. In UML'02: 5th International Conference on The UML, pages 426{441, Dresden, Germany, 2002. Springer-Verlag.
    • (2002) UML'02: 5th International Conference on the UML , pp. 426-441
    • Lodderstedt, T.1    Basin, D.2    Doser, J.3
  • 17
  • 24
    • 33744989032 scopus 로고    scopus 로고
    • Usage control: A vision for next generation access control
    • V. Gorodetsky et al. (Eds.), LNCS 2776, 1:17{31
    • R. Sandhu and J. Park. Usage control: A vision for next generation access control. V. Gorodetsky et al. (Eds.): MMM-ACNS 2003, LNCS 2776, 1:17{31, 2003.
    • (2003) MMM-ACNS 2003
    • Sandhu, R.1    Park, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.