메뉴 건너뛰기




Volumn 1999-January, Issue , 1999, Pages 57-71

A user-centered, modular authorization service built on an RBAC foundation

Author keywords

[No Author keywords available]

Indexed keywords

RISK MANAGEMENT;

EID: 84940100462     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECPRI.1999.766718     Document Type: Conference Paper
Times cited : (30)

References (52)
  • 1
    • 84940117376 scopus 로고    scopus 로고
    • "Adage System Overview." http://www.memesoft.com/adage/docs/SystemSpec.ps
    • Adage System Overview
  • 3
    • 0025028340 scopus 로고
    • Naming and grouping privileges to simplify security management in large database
    • May
    • Baldwin, R. W. "Naming and Grouping Privileges to Simplify Security Management in Large Database" Proc. 1990 IEEE Symposium on Security and Privacy, 116-132, May 1990
    • (1990) Proc 1990 IEEE Symposium on Security and Privacy , pp. 116-132
    • Baldwin, R.W.1
  • 16
    • 84940117380 scopus 로고    scopus 로고
    • CORBAServices: Common Object Services Specification
    • CORBAServices: Common Object Services Specification. http://www.omg.org/corba/sectrans.htm
  • 25
    • 0002263608 scopus 로고    scopus 로고
    • A new security policy for distributed resource management and access control
    • September
    • S.J.Greenwald. "A New Security Policy for Distributed Resource Management and Access Control." Proc. New Security Paradigms Workshop, September 1996
    • (1996) Proc. New Security Paradigms Workshop
    • Greenwald, S.J.1
  • 32
    • 79958153716 scopus 로고    scopus 로고
    • Triggers and barriers to customizing software
    • W.E. Mackay. "Triggers and barriers to customizing software." Proc. CHI 91
    • Proc. CHI 91
    • Mackay, W.E.1
  • 37
    • 84940117386 scopus 로고    scopus 로고
    • HP Praesidium/Authorization Server White Paper
    • HP Praesidium/Authorization Server White Paper. http://www.hp.com/security/products/authorization-server/papers/whitepaper/
  • 40
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Saltzer, J.H., and Schroeder, M.D. "The Protection of Information in Computer Systems, " Proceedings of IEEE, 63(9), 1278-1308, 1975
    • (1975) Proceedings of IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 45
    • 0007473204 scopus 로고    scopus 로고
    • An introduction to intrusion detection
    • April
    • A. Sundaram. "An Introduction to Intrusion Detection." ACM Crossroads, Vol. 2, No. 4, April 1996. http://www.acm.org/crossroads/xrds2-4/intrus.html
    • (1996) ACM Crossroads , vol.2 , Issue.4
    • Sundaram, A.1
  • 46
    • 63449132197 scopus 로고    scopus 로고
    • Carnegie-Mellon University Software Technology Review: Statistical-Based Intrusion Detection
    • Software Engineering Institute. Carnegie-Mellon University. "Software Technology Review: Statistical-Based Intrusion Detection." http://www.sei.cmu.edu/technology/str/descriptions/sbid.html
    • Software Engineering Institute


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.