메뉴 건너뛰기




Volumn 2480, Issue , 2002, Pages 180-192

A uniform model for authorization and access control in enterprise information platform

Author keywords

[No Author keywords available]

Indexed keywords

DATA INTEGRATION; INFORMATION SYSTEMS; INFORMATION USE; MANAGEMENT INFORMATION SYSTEMS; NATURAL RESOURCES MANAGEMENT; RESOURCE ALLOCATION; WORK SIMPLIFICATION;

EID: 84931361791     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45785-2_14     Document Type: Conference Paper
Times cited : (4)

References (12)
  • 1
    • 0002848811 scopus 로고    scopus 로고
    • An Approach for the Specification and Enforcement of Authorization Constraints in Workflow Management Systems
    • February
    • Bertino E., Ferrari E. and Atluri V. An Approach for the Specification and Enforcement of Authorization Constraints in Workflow Management Systems, ACM Transactions on Information Systems Security, February 1999, Vol 1, No. 1
    • (1999) ACM Transactions on Information Systems Security , vol.1 , Issue.1
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 2
    • 0035594917 scopus 로고    scopus 로고
    • Managing Workflow Authorization Constraints through Active Database Technologh
    • September
    • Castano, S., Casati F., and Fugini M. Managing Workflow Authorization Constraints through Active Database Technologh, Information Systems Frontiers, 3(3) September 2001.
    • (2001) Information Systems Frontiers , vol.3 , Issue.3
    • Castano, S.1    Casati, F.2    Fugini, M.3
  • 3
    • 0036161253 scopus 로고    scopus 로고
    • Authorization and Access Control of Application Data in Workflow Systems
    • January
    • Shengli Wu, Amit Sheth John Miller, Zongwei Luo. Authorization and Access Control of Application Data in Workflow Systems, Intelligent Information Systems, January 2002, pp. 71-94
    • (2002) Intelligent Information Systems , pp. 71-94
    • Wu, S.1    Sheth, A.2    Miller, J.3    Luo, Z.4
  • 6
    • 84974750564 scopus 로고
    • Authorizations in distributed systems: A new approach
    • T. Y. C. Woo and S. S. Lam, Authorizations in distributed systems: A new approach. Journal of Computer Security, 2(2, 3): 107-136, 1993
    • (1993) Journal of Computer Security , vol.2 , Issue.2-3 , pp. 107-136
    • Woo, T.Y.C.1    Lam, S.S.2
  • 10
    • 0001071507 scopus 로고    scopus 로고
    • Strauss, Compliance checking in the policymaker trust management system
    • LNCS, Springer-Verlag
    • Blaze, Feigenbaum, Strauss, Compliance checking in the policymaker trust management system. In FC: International Conference on Financial Cryptography. LNCS, Springer-Verlag, 1998
    • (1998) FC: International Conference on Financial Cryptography
    • Blaze, F.1
  • 11
    • 85084161655 scopus 로고    scopus 로고
    • Unified support for heterogeneous security policies in distributed systems
    • Berkeley, Jan. 26-29, Usenix Association
    • N. H. Minsky, V. Ungureanu, Unified support for heterogeneous security policies in distributed systems. In proceeding of the 7th USENIX Security Symposium (SECURITY-98), pages 131-142, Berkeley, Jan. 26-29, 1998. Usenix Association
    • (1998) Proceeding of the 7th USENIX Security Symposium (SECURITY-98) , pp. 131-142
    • Minsky, N.H.1    Ungureanu, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.