메뉴 건너뛰기




Volumn , Issue , 2004, Pages 522-529

A Framework for Role-Based Access Control in Group Communication Systems

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL MECHANISM; ACCESS CONTROL POLICIES; CLIENT /SERVER; FINE GRAINED; GROUP COMMUNICATION SYSTEMS; GROUP COMMUNICATIONS; PARAMETER-TIME; ROLE-BASED ACCESS CONTROL; SERVER GROUP;

EID: 84893215141     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (17)

References (29)
  • 2
  • 8
    • 0345427593 scopus 로고    scopus 로고
    • Tech. Rep. 2000-1823, Cornell University, Computer Science; Tech. Rep. 2000-45, Hebrew University, Computer Science
    • O. Rodeh, K. Birman, and D. Dolev, "Using AVL trees for fault tolerant group key management, " Tech. Rep. 2000-1823, Cornell University, Computer Science; Tech. Rep. 2000-45, Hebrew University, Computer Science, 2000.
    • (2000) Using AVL trees for fault tolerant group key management
    • Rodeh, O.1    Birman, K.2    Dolev, D.3
  • 9
    • 0003774039 scopus 로고    scopus 로고
    • Tech. Rep. 98-4, Johns Hopkins University, Center of Networking and Distributed Systems
    • Y. Amir and J. Stanton, "The Spread wide area group communication system, " Tech. Rep. 98-4, Johns Hopkins University, Center of Networking and Distributed Systems, 1998.
    • (1998) The Spread wide area group communication system
    • Amir, Y.1    Stanton, J.2
  • 17
    • 85010853294 scopus 로고    scopus 로고
    • The architecture and performance of security protocols in the Ensemble Group Communication System
    • August
    • O. Rodeh, K. Birman, and D. Dolev, "The architecture and performance of security protocols in the Ensemble Group Communication System, " ACM Transactions on Information and System Security, vol. 4, pp. 289-319, August 2001.
    • (2001) ACM Transactions on Information and System Security , vol.4 , pp. 289-319
    • Rodeh, O.1    Birman, K.2    Dolev, D.3
  • 23
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • Sept
    • B. C. Neuman and T. Ts'o, "Kerberos: An authentication service for computer networks, " IEEE Communications Magazine, pp. 33-38, Sept. 1994.
    • (1994) IEEE Communications Magazine , pp. 33-38
    • Neuman, B. C.1    Ts'o, T.2
  • 25
    • 0011917214 scopus 로고
    • I.-T. R. X. (revised), International Telecommunication Union
    • I.-T. R. X. (revised), The Directory - Authentication Framework. International Telecommunication Union, 1993.
    • (1993) The Directory - Authentication Framework
  • 27
    • 0036086451 scopus 로고    scopus 로고
    • Methods and limitations of security policy reconciliation
    • (Oakland, CA), May
    • P. McDaniel and A. Prakash, "Methods and limitations of security policy reconciliation, " in IEEE Symposium on Security and Privacy, (Oakland, CA), pp. 73-87, May 2002.
    • (2002) IEEE Symposium on Security and Privacy , pp. 73-87
    • McDaniel, P.1    Prakash, A.2
  • 28
    • 2942654406 scopus 로고    scopus 로고
    • Certificate-based authorization policy in a PKI environment
    • M. R. Thompson, A. Essiari, and S. Mudumbai, "Certificate-based authorization policy in a PKI environment, " ACM Trans. Inf. Syst. Secur., vol. 6, no. 4, pp. 566-588, 2003.
    • (2003) ACM Trans. Inf. Syst. Secur , vol.6 , Issue.4 , pp. 566-588
    • Thompson, M. R.1    Essiari, A.2    Mudumbai, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.