메뉴 건너뛰기




Volumn 142, Issue , 2004, Pages 316-329

Safety and liveness for an RBAC/ MAC security model

Author keywords

Liveness; Safety; Security assurance; Simple integrity; Simple security

Indexed keywords

ACCIDENT PREVENTION; INFORMATION TECHNOLOGY;

EID: 84902439737     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (2)

References (16)
  • 4
    • 0033645572 scopus 로고    scopus 로고
    • TRBAC: A Temporal Role-Based Access Control Model
    • E. Bertino, et al., "TRBAC: A Temporal Role-Based Access Control Model," Proc. of 5th ACM Wksp. on RBAC, 2000.
    • (2000) Proc. of 5th ACM Wksp. On RBAC
    • Bertino, E.1
  • 6
    • 0031611731 scopus 로고    scopus 로고
    • Formal Specification For Role Based Access Control User/Role and Role/Role Relationship Management
    • S. Gavrila and J. Barkley, "Formal Specification For Role Based Access Control User/Role and Role/Role Relationship Management," Proc. of the 3rd ACM Wksp. on RBAC, 1998.
    • (1998) Proc. of the 3rd ACM Wksp. On RBAC
    • Gavrila, S.1    Barkley, J.2
  • 8
    • 0017472779 scopus 로고
    • Proving the Correctness of Multiprocess Programs
    • L. Lamport, "Proving the Correctness of Multiprocess Programs," IEEE Trans. on Software Engineering, Vol. 3, No. 2, 1977.
    • (1977) IEEE Trans. On Software Engineering , vol.3 , Issue.2
    • Lamport, L.1
  • 10
    • 2442701031 scopus 로고    scopus 로고
    • A Model for Information Assurance: An Integrated Approach
    • W. Maconachy, et al., "A Model for Information Assurance: An Integrated Approach," Proc. of IEEE Info. Assurance Wksp., 2001.
    • (2001) Proc. of IEEE Info. Assurance Wksp
    • Maconachy, W.1
  • 12
    • 84884311106 scopus 로고    scopus 로고
    • Configuring Role-Based Access Control to Enforce Mandatory And Discretionary Access Control Policies
    • S. Osborn, et al., "Configuring Role-Based Access Control to Enforce Mandatory And Discretionary Access Control Policies," ACM Trans. on Information and System Security, Vol. 3, No. 2, 2000.
    • (2000) ACM Trans. On Information and System Security , vol.3 , Issue.2
    • Osborn, S.1
  • 13
    • 84902483346 scopus 로고    scopus 로고
    • Security Engineering for Roles and Resources in a Distributed Environment
    • C. Phillips, et al., "Security Engineering for Roles and Resources in a Distributed Environment," Proc. of 3rd ISSEA Conf., 2002.
    • (2002) Proc. of 3rd ISSEA Conf
    • Phillips, C.1
  • 15
    • 0027699087 scopus 로고
    • Lattice-Based Access Control Models
    • R. Sandhu, "Lattice-Based Access Control Models," Computer Journal, Vol. 26, No. 11, 1993.
    • (1993) Computer Journal , vol.26 , Issue.11
    • Sandhu, R.1
  • 16
    • 84902483334 scopus 로고    scopus 로고
    • http://www.engr.uconn.edu/steve/DSEC/dsec.html


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.