메뉴 건너뛰기




Volumn 11, Issue 5, 2014, Pages 412-424

Abductive Analysis of Administrative Policies in Rule-Based Access Control

Author keywords

attribute based access control; policy administration; policy verification; rule based policy; Security policy

Indexed keywords

COMPUTATION THEORY; ELECTRICAL ENGINEERING;

EID: 84934756449     PISSN: 15455971     EISSN: 19410018     Source Type: Journal    
DOI: 10.1109/TDSC.2013.42     Document Type: Article
Times cited : (13)

References (17)
  • 1
    • 0030086382 scopus 로고    scopus 로고
    • Role-Based Access Control Models
    • Feb.
    • R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, "Role-Based Access Control Models," Computer, vol. 29, no. 2, pp. 38-47, Feb. 1996.
    • (1996) Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1    Coyne, E.2    Feinstein, H.3    Youman, C.4
  • 3
    • 33845517298 scopus 로고    scopus 로고
    • Security Analysis in Role-Based Access Control
    • Nov.
    • N. Li and M.V. Tripunitara, "Security Analysis in Role-Based Access Control," ACM Trans. Information and System Security, vol. 9, no. 4, pp. 391-420, Nov. 2006.
    • (2006) ACM Trans. Information and System Security , vol.9 , Issue.4 , pp. 391-420
    • Li, N.1    Tripunitara, M.V.2
  • 5
    • 84865737952 scopus 로고    scopus 로고
    • Policy Analysis for Administrative Role Based Access Control
    • Oct.
    • A. Sasturkar, P. Yang, S.D. Stoller, and C.R. Ramakrishnan, "Policy Analysis for Administrative Role Based Access Control," Theoretical Computer Science, vol. 412, no. 44, pp. 6208-6234, Oct. 2011.
    • (2011) Theoretical Computer Science , vol.412 , Issue.44 , pp. 6208-6234
    • Sasturkar, A.1    Yang, P.2    Stoller, S.D.3    Ramakrishnan, C.R.4
  • 6
    • 79951677949 scopus 로고    scopus 로고
    • Symbolic Reachability Analysis for Parameterized Administrative Role Based Access Control
    • Mar.-May
    • S.D. Stoller, P. Yang, M. Gofman, and C.R. Ramakrishnan, "Symbolic Reachability Analysis for Parameterized Administrative Role Based Access Control," Computers & Security, vol. 30, no. 2/3, pp. 148-164, Mar.-May 2011.
    • (2011) Computers & Security , vol.30 , Issue.2-3 , pp. 148-164
    • Stoller, S.D.1    Yang, P.2    Gofman, M.3    Ramakrishnan, C.R.4
  • 10
    • 38549169180 scopus 로고    scopus 로고
    • The Role of Abduction in Declarative Authorization Policies
    • Proc. 10th Int'l Conf. Practical Aspects of Declarative Languages (PADL '08), ser.
    • M.Y. Becker and S. Nanz, "The Role of Abduction in Declarative Authorization Policies," Proc. 10th Int'l Conf. Practical Aspects of Declarative Languages (PADL '08), ser. Lecture Notes in Computer Science, vol. 4902, pp. 84-99, 2008.
    • (2008) Lecture Notes in Computer Science , vol.4902 , pp. 84-99
    • Becker, M.Y.1    Nanz, S.2
  • 17
    • 84977865684 scopus 로고    scopus 로고
    • Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-Mechanizable Activities
    • M. Barletta, S. Ranise, and L. Vigano, "Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-Mechanizable Activities," Proc. Eighth Int'l Workshop Security and Trust Management (STM), pp. 49-64, 2012.
    • (2012) Proc. Eighth Int'l Workshop Security and Trust Management (STM) , pp. 49-64
    • Barletta, M.1    Ranise, S.2    Vigano, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.