메뉴 건너뛰기




Volumn 5, Issue 3, 2013, Pages 34-49

A trustworthy usage control enforcement framework

Author keywords

Framework; Policy Enforcement; Security; Trusted Computing; Usage Control

Indexed keywords

FRAMEWORK; POLICY ENFORCEMENT; SECURITY; TRUSTED COMPUTING; USAGE CONTROL;

EID: 84893260044     PISSN: 19379412     EISSN: 19379404     Source Type: Journal    
DOI: 10.4018/jmcmc.2013070103     Document Type: Article
Times cited : (7)

References (25)
  • 3
    • 84893317855 scopus 로고    scopus 로고
    • Finney, H. (2011). Privacy ca. Retrieved from http://www.privacyca.com
    • (2011) Privacy Ca
    • Finney, H.1
  • 12
    • 67349182373 scopus 로고    scopus 로고
    • A brief account of runtime verification
    • doi:10.1016/j.jlap.2008.08.004
    • Leucker, M., & Schallhart, C. (2009). A brief account of runtime verification. Journal of Logic and Algebraic Programming, 78(5), 293-303. doi:10.1016/j.jlap.2008.08.004.
    • (2009) Journal of Logic and Algebraic Programming , vol.78 , Issue.5 , pp. 293-303
    • Leucker, M.1    Schallhart, C.2
  • 13
    • 57349177897 scopus 로고    scopus 로고
    • The power of events: An introduction to complex event processing in distributed enterprise systems
    • Springer. doi:10.1007/978-3-540-88808-6-2
    • Luckham, D. (2008). The power of events: An introduction to complex event processing in distributed enterprise systems. In Rule representation, interchange and reasoning on the web. Springer. doi:10.1007/978-3-540-88808-6-2.
    • (2008) Rule Representation, Interchange and Reasoning on the Web
    • Luckham, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.