메뉴 건너뛰기




Volumn 2000-January, Issue , 2000, Pages 100-106

Policy mediation for multi-enterprise environments

Author keywords

Access control; Authentication; Communication system security; Computer science; Databases; Fasteners; Information security; Mediation; Middleware; NIST

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; COMPUTER CONTROL SYSTEMS; COMPUTER SCIENCE; DATABASE SYSTEMS; FASTENERS; INFORMATION SERVICES; MIDDLEWARE; NETWORK ARCHITECTURE; SECURITY OF DATA; SECURITY SYSTEMS; STATIC ANALYSIS;

EID: 84902478861     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2000.898863     Document Type: Conference Paper
Times cited : (6)

References (25)
  • 1
    • 0038516725 scopus 로고
    • A generalized framework for access control: An informal description
    • M. Abrams et al. (1990) A generalized framework for access control: An informal description. Proc. 13th National Computer Security Conference, 135-143.
    • (1990) Proc. 13th National Computer Security Conference , pp. 135-143
    • Abrams, M.1
  • 6
    • 0031357551 scopus 로고    scopus 로고
    • Authorization specification and enforcement in federated database systems
    • S. De Capitani di Vimercati and P. Samarati (1997) Authorization specification and enforcement in federated database systems. Journal of Computer Security, 5(2), 155-188.
    • (1997) Journal of Computer Security , vol.5 , Issue.2 , pp. 155-188
    • De Capitani Di Vimercati, S.1    Samarati, P.2
  • 13
    • 0031162048 scopus 로고    scopus 로고
    • A unified framework for enforcing multiple access control policies
    • S. Jajodia et al. (1997) A unified framework for enforcing multiple access control policies. Proc. ACM SIGMOD Conference, 474-485.
    • (1997) Proc. ACM SIGMOD Conference , pp. 474-485
    • Jajodia, S.1
  • 14
    • 0013194038 scopus 로고
    • Argos - A configurable access control system for interoperable environments
    • (eds. Spooner, D. et al.), Chapman-Hall, London
    • D. Jonscher and K. Dittrich (1995) Argos - A configurable access control system for interoperable environments, in Database Security, IX: Status and Prospects (eds. Spooner, D. et al.), Chapman-Hall, London, 43-60.
    • (1995) Database Security, IX: Status and Prospects , pp. 43-60
    • Jonscher, D.1    Dittrich, K.2
  • 19
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • R. Sandhu (1993) Lattice-based access control models. IEEE Computer, 26(11), 9-19.
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.1
  • 20
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • R. Sandhu et al. (1996) Role-based access control models. IEEE Computer, 29(2), 38-47.
    • (1996) IEEE Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1
  • 22
    • 0003714340 scopus 로고    scopus 로고
    • National Academy Press, Washington D.C
    • F. Schneider (Ed.) (1999) Trust in Cyberspace. National Academy Press, Washington D.C.
    • (1999) Trust in Cyberspace
    • Schneider, F.1
  • 25
    • 0026836188 scopus 로고
    • Mediators in the architecture of future information systems: A new approach
    • G. Wiederhold (1992) Mediators in the architecture of future information systems: A new approach. IEEE Computer, 25(3), 38-49.
    • (1992) IEEE Computer , vol.25 , Issue.3 , pp. 38-49
    • Wiederhold, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.