메뉴 건너뛰기




Volumn 4, Issue 3, 2001, Pages 191-233

TRBAC: A Temporal Role-Based Access Control Model

Author keywords

Role triggers; Role Based access control; Security; Temporal constraints

Indexed keywords


EID: 84944792110     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/501978.501979     Document Type: Article
Times cited : (663)

References (19)
  • 2
    • 0004881442 scopus 로고    scopus 로고
    • Design and implementation of a reliable group communication toolkit for Java
    • http://www.cs.cornell.edu/home/bba/papers.html
    • Ban, B. 1998. Design and implementation of a reliable group communication toolkit for Java. http://www.cs.cornell.edu/home/bba/papers.html.
    • (1998)
    • Ban, B.1
  • 5
    • 0003686066 scopus 로고    scopus 로고
    • An internet attribute certificate profile for authorization
    • draft-ietf-pkix-ac509prof-06.txt (January 10, 2001).
    • Farrell S., and Housley, R. 2001. An internet attribute certificate profile for authorization. draft-ietf-pkix-ac509prof-06.txt (January 10, 2001).
    • (2001)
    • Farrell, S.1    Housley, R.2
  • 7
    • 85084162284 scopus 로고    scopus 로고
    • Enclaves: Enabling secure collaboration over the Internet
    • (San Jose, Calif., July), USENIX Association, Berkeley, Calif.
    • Gong, L. 1996. Enclaves: Enabling secure collaboration over the Internet. In Proceedings of the 6th USENIX Unix and Network Security Symposium (San Jose, Calif., July), USENIX Association, Berkeley, Calif., pp. 149-159.
    • (1996) Proceedings of the 6th USENIX Unix and Network Security Symposium , pp. 149-159
    • Gong, L.1
  • 8
    • 0028429984 scopus 로고
    • Computer-supported cooperative work: History and focus
    • (May)
    • Grudin, J. 1994. Computer-supported cooperative work: History and focus. IEEE Comput. 27, 5, (May), 19-26.
    • (1994) IEEE Comput. , vol.27 , Issue.5 , pp. 19-26
    • Grudin, J.1
  • 9
    • 0009985302 scopus 로고    scopus 로고
    • Secure IP multicast: Problem areas, framework, and building blocks
    • Internet Draft draft-irtf-smug-framework-00.txt (Oct.)
    • Hardjono, T., Canetti, R., Baugher, M., and Dinsmore, P. 1999. Secure IP multicast: Problem areas, framework, and building blocks. Internet Draft draft-irtf-smug-framework-00.txt (Oct.).
    • (1999)
    • Hardjono, T.1    Canetti, R.2    Baugher, M.3    Dinsmore, P.4
  • 10
    • 0004136464 scopus 로고    scopus 로고
    • The Ensemble system
    • Ph.D. dissertation. Cornell Univ. Ithaca, New York, (Available as technical report TR98-1662)
    • Hayden, M. 1998. The Ensemble system. Ph.D. dissertation. Cornell Univ. Ithaca, New York, (Available as technical report TR98-1662).
    • (1998)
    • Hayden, M.1
  • 11
    • 0032023696 scopus 로고    scopus 로고
    • An internet security framework based on short-lived certificates
    • (Mar./Apr.)
    • Hsu, Y.-K., and Seymour, S. P. 1998. An internet security framework based on short-lived certificates. IEEE Internet Comput. 2, 2 (Mar./Apr.), 73-79.
    • (1998) IEEE Internet Comput. , vol.2 , Issue.2 , pp. 73-79
    • Hsu, Y.-K.1    Seymour, S.P.2
  • 13
    • 84961736396 scopus 로고    scopus 로고
    • Architecture and concepts of the MPOG
    • NAI Labs at Network Associates, Inc., Los Angeles, Calif.
    • Lamperillo, G. 1999. Architecture and concepts of the MPOG. Tech. Rep. NAI #0768. NAI Labs at Network Associates, Inc., Los Angeles, Calif.
    • (1999) Tech. Rep.
    • Lamperillo, G.1
  • 14
    • 34248514514 scopus 로고
    • Learn system-level Win 32 coding techniques by writing an API spy program
    • Pietrek, M. 1994. Learn system-level Win 32 coding techniques by writing an API spy program, Microsoft Syst. J. 9, 12, 17-44.
    • (1994) Microsoft Syst. J. , vol.9 , Issue.12 , pp. 17-44
    • Pietrek, M.1
  • 15
    • 0042458192 scopus 로고
    • Secure agreement protocols: Reliable and atomic group multicast in Rampart
    • (Fairfax, Va., Nov.) ACM, New York
    • Reiter, M. 1994. Secure agreement protocols: Reliable and atomic group multicast in Rampart, in Proceedings of the 2nd ACM Conference on Computer and Communication Security (Fairfax, Va., Nov.) ACM, New York, pp. 68-80.
    • (1994) Proceedings of the 2nd ACM Conference on Computer and Communication Security , pp. 68-80
    • Reiter, M.1
  • 16
    • 12444316446 scopus 로고    scopus 로고
    • The Java reliable multicast service: A reliable multicast library
    • Sun Microsystems Laboratories, Chelmsford, MA.
    • Rosenzweig, P., Kadansky, M., and Hanna, S. 1998. The Java reliable multicast service: A reliable multicast library. Tech. Rep. #TR-98-68. Sun Microsystems Laboratories, Chelmsford, MA.
    • (1998) Tech. Rep. #TR-98-68.
    • Rosenzweig, P.1    Kadansky, M.2    Hanna, S.3
  • 17
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • (Feb.)
    • Sandhu, R., Coyne, E., Feinstein, H., and Youman, C. 1996. Role-based access control models, IEEE Comput. 29, 2 (Feb.), 38-47.
    • (1996) IEEE Comput. , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1    Coyne, E.2    Feinstein, H.3    Youman, C.4
  • 18
    • 84961735017 scopus 로고    scopus 로고
    • Sigma: Security for distributed object interoperability between trusted and untrusted systems
    • (San Diego, Calif., Dec.). IEEE Computer Society Press, Los Alamitos, Calif.
    • Sebes, E. J., and Vickers Benzel, T. C. 1996. Sigma: Security for distributed object interoperability between trusted and untrusted systems, in Proceedings of the 12th Computer Security Applications Conference (San Diego, Calif., Dec.). IEEE Computer Society Press, Los Alamitos, Calif., pp. 158-168.
    • (1996) Proceedings of the 12th Computer Security Applications Conference , pp. 158-168
    • Sebes, E.J.1    Vickers Benzel, T.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.