메뉴 건너뛰기




Volumn 261, Issue , 2008, Pages 25-37

Context based enforcement of authorization for privacy and security in identity management

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; DEVELOPING COUNTRIES; RESEARCH; CRIME; MOBILE SECURITY;

EID: 84902171246     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-77996-6_3     Document Type: Conference Paper
Times cited : (11)

References (10)
  • 1
    • 0031382313 scopus 로고    scopus 로고
    • A Flexible Model for the Specification and Enforcement of Role-Based Authorizations in Workflow Management Systems
    • RBAC-97, ACM Press, New York
    • E. Bertino, E. Ferrari, V. Atluri, "A Flexible Model for the Specification and Enforcement of Role-Based Authorizations in Workflow Management Systems," In Proceedings of the 2nd ACM Workshop on Role-Based Access Control (RBAC-97), ACM Press, New York, 1997, pp. 6-7.
    • (1997) Proceedings of the 2nd ACM Workshop on Role-Based Access Control , pp. 6-7
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 2
    • 0035480037 scopus 로고    scopus 로고
    • Identity management and its support of multilateral security
    • S. Claußand M. Köhntopp. Identity management and its support of multilateral security. Computer Networks, 37 (2001), 205-219.
    • (2001) Computer Networks , vol.37 , pp. 205-219
    • Claußand, S.1    Köhntopp, M.2
  • 5
    • 35248896164 scopus 로고    scopus 로고
    • A Flexible Method for Information System Security Policy Specification
    • Louvainla-Neuve, Belgium, Springer-Verlag
    • R. Ortalo. A Flexible Method for Information System Security Policy Specification. Proceedings of 5th European Symposium on Research in Computer Security, 1998. Louvainla-Neuve, Belgium, Springer-Verlag.
    • (1998) Proceedings of 5th European Symposium on Research in Computer Security
    • Ortalo, R.1
  • 6
    • 85062135381 scopus 로고    scopus 로고
    • J. Rumbaugh, et al: The Unified Modeling Language Reference Manual, Addison-Wesley
    • J. Rumbaugh, et al: The Unified Modeling Language Reference Manual, Addison-Wesley.
  • 7
    • 38949214729 scopus 로고    scopus 로고
    • Security Contexts in Autonomic Computing Systems
    • Proceedings of Proceedings of 2006 International Conference on Computational Intelligence and Security CIS2006, November 03-06, Guangzhou, PRC
    • Kaiyu Wan, Vasu Alagar. Security Contexts in Autonomic Computing Systems. In Proceedings of Proceedings of 2006 International Conference on Computational Intelligence and Security (CIS2006), November 03-06, 2006, Guangzhou, PRC, page 1523-1527. (also to appear in Lecture Notes in Artificial Intelligence)
    • (2006) also to appear in Lecture Notes in Artificial Intelligence , pp. 1523-1527
    • Wan, K.1    Alagar, V.2
  • 8
    • 85062127665 scopus 로고    scopus 로고
    • Fighting Back Against Identity Theft, U.S. Federal Trade Commission
    • Fighting Back Against Identity Theft - U.S. Federal Trade Commission. www.ftc.gov/bcp/edu/microsites/idtheft/
  • 9
    • 85062133603 scopus 로고    scopus 로고
    • Identity Theft: What is it and What you can do about it?, Office of the Privacy Commissioner of Canada, www.privcom.gc.ca/fs-fi/02_05_d_10_e.asp/
    • Identity Theft: What is it and What you can do about it?, Office of the Privacy Commissioner of Canada, www.privcom.gc.ca/fs-fi/02_05_d_10_e.asp/
  • 10
    • 85062131757 scopus 로고    scopus 로고
    • European Conference Maintaining the integrity of identities and payments: Two challenges for fraud prevention. ec.europa.eu/ justice_home/news/information_dossiers/conference_integrity/index en.htm/
    • European Conference "Maintaining the integrity of identities and payments: Two challenges for fraud prevention". ec.europa.eu/ justice_home/news/information_dossiers/conference_integrity/index en.htm/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.