메뉴 건너뛰기




Volumn , Issue , 2013, Pages 145-160

Application-sensitive access control evaluation using parameterized expressiveness

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL SCHEMES; BEST FIT; FORMAL FRAMEWORK; MAIN TASKS; PARAMETERIZED;

EID: 84884999344     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2013.17     Document Type: Conference Paper
Times cited : (20)

References (16)
  • 2
    • 0017512599 scopus 로고
    • A linear time algorithm for deciding subject security
    • R. J. Lipton and L. Snyder, "A linear time algorithm for deciding subject security, " Journal of the ACM, vol. 24, no. 3, pp. 455-464, 1977.
    • (1977) Journal of the ACM , vol.24 , Issue.3 , pp. 455-464
    • Lipton, R.J.1    Snyder, L.2
  • 3
    • 0030365407 scopus 로고    scopus 로고
    • The expressive power of multi-parent creation in monotonic access control models
    • P. Ammann, R. J. Lipton, and R. S. Sandhu, "The expressive power of multi-parent creation in monotonic access control models, " Journal of Computer Security, vol. 4, no. 2/3, pp. 149-166, 1996.
    • (1996) Journal of Computer Security , vol.4 , Issue.2-3 , pp. 149-166
    • Ammann, P.1    Lipton, R.J.2    Sandhu, R.S.3
  • 4
    • 0034823078 scopus 로고    scopus 로고
    • A state-transition model of trust management and access control
    • A. Chander, J. C. Mitchell, and D. Dean, "A state-transition model of trust management and access control, " in CSFW. IEEE Computer Society, 2001, pp. 27-43.
    • (2001) CSFW. IEEE Computer Society , pp. 27-43
    • Chander, A.1    Mitchell, J.C.2    Dean, D.3
  • 5
    • 33847356528 scopus 로고    scopus 로고
    • A theory for comparing the expressive power of access control models
    • M. V. Tripunitara and N. Li, "A theory for comparing the expressive power of access control models, " Journal of Computer Security, vol. 15, no. 2, pp. 231-272, 2007.
    • (2007) Journal of Computer Security , vol.15 , Issue.2 , pp. 231-272
    • Tripunitara, M.V.1    Li, N.2
  • 6
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • May
    • S. Osborne, R. Sandhu, and Q. Munawer, "Configuring role-based access control to enforce mandatory and discretionary access control policies, " ACM Transactions on Information and System Security, vol. 3, no. 2, pp. 85-106, May 2000.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.2 , pp. 85-106
    • Osborne, S.1    Sandhu, R.2    Munawer, Q.3
  • 7
    • 84974744165 scopus 로고
    • Expressive power of the schematic protection model
    • R. Sandhu, "Expressive power of the schematic protection model, " Journal of Computer Security, vol. 1, no. 1, pp. 59-98, 1992.
    • (1992) Journal of Computer Security , vol.1 , Issue.1 , pp. 59-98
    • Sandhu, R.1
  • 10
    • 84863962705 scopus 로고    scopus 로고
    • Networking to enable coalition operations
    • U. S. Air Force Scientific Advisory Board
    • U. S. Air Force Scientific Advisory Board, "Networking to enable coalition operations, " MITRE Corporation, Tech. Rep., 2004.
    • (2004) MITRE Corporation, Tech. Rep.
  • 12
    • 33845437573 scopus 로고    scopus 로고
    • Horizontal integration: Broader access models for realizing information dominance
    • Dec.
    • "Horizontal integration: Broader access models for realizing information dominance, " MITRE Corporation JASON Program Office, Tech. Rep. JSR-04-13, Dec. 2004.
    • (2004) MITRE Corporation JASON Program Office, Tech. Rep. JSR-04-13
  • 15
    • 30544438141 scopus 로고    scopus 로고
    • Beyond proof-ofcompliance: Security analysis in trust management
    • N. Li, J. C. Mitchell, and W. H. Winsborough, "Beyond proof-ofcompliance: security analysis in trust management, " Journal of the ACM, vol. 52, no. 3, pp. 474-514, 2005.
    • (2005) Journal of the ACM , vol.52 , Issue.3 , pp. 474-514
    • Li, N.1    Mitchell, J.C.2    Winsborough, W.H.3
  • 16
    • 52049125054 scopus 로고    scopus 로고
    • A natural axiomatization of computability and proof of Church's thesis
    • N. Dershowitz and Y. Gurevich, "A natural axiomatization of computability and proof of Church's thesis, " Bulletin of Symbolic Logic, vol. 14, no. 3, pp. 299-350, 2008.
    • (2008) Bulletin of Symbolic Logic , vol.14 , Issue.3 , pp. 299-350
    • Dershowitz, N.1    Gurevich, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.