메뉴 건너뛰기




Volumn 1325, Issue , 1997, Pages 579-589

A modal logical framework for security policies

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CIRCUITS; INTELLIGENT SYSTEMS; KNOWLEDGE REPRESENTATION; SECURITY SYSTEMS;

EID: 84947730526     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-63614-5_56     Document Type: Conference Paper
Times cited : (21)

References (17)
  • 4
    • 84974754345 scopus 로고
    • A Logical View of Secure Dependencies
    • P. Bieber and F. Cuppens. A Logical View of Secure Dependencies. Journal of Computer Security, 1(1): 99-129, 1992.
    • (1992) Journal of Computer Security , vol.1 , Issue.1 , pp. 99-129
    • Bieber, P.1    Cuppens, F.2
  • 6
    • 0345780107 scopus 로고
    • Inference Through Secondary Path Analysis
    • North-Holland, Results of the IFIP WG 11. 3 Workshop on Database Security
    • L. Binns. Inference Through Secondary Path Analysis. In Database Security, 6: Status and Prospects. North-Holland, 1993. Results of the IFIP WG 11. 3 Workshop on Database Security.
    • (1993) Database Security, 6: Status and Prospects
    • Binns, L.1
  • 9
    • 0346625224 scopus 로고    scopus 로고
    • A Deontic Logic for Reasoning about Confidentiality
    • M. Brown and J. Carmo, editors, Workshops in Computing. Springer
    • F. Cuppens and R. Demolombe. A Deontic Logic for Reasoning about Confidentiality. In M. Brown and J. Carmo, editors, Deontic Logic, Agency and Normative Systems, Workshops in Computing. Springer, 1996.
    • (1996) Deontic Logic, Agency and Normative Systems
    • Cuppens, F.1    Demolombe, R.2
  • 13
    • 0007831045 scopus 로고
    • Deontic database constraints and the characterization of recovery
    • A.J.I. Jones and M. Sergot, editors, Oslo, Norway
    • J. Carmo and A. I. J. Jones, Deontic database constraints and the characterization of recovery. In A. J. I. Jones and M. Sergot, editors, Second International Workshop on Deontic Logic in Computer Science, Oslo, Norway, 1994.
    • (1994) Second International Workshop on Deontic Logic in Computer Science
    • Carmo, J.1    Jones, A.I.J.2
  • 14
    • 0007727394 scopus 로고
    • Ideatity, Sub-ideality and Deontic Logic
    • A. J. I. Jones and I. Pern. Ideatity, Sub-ideality and Deontic Logic. Synthese, 65, 1985.
    • (1985) Synthese , pp. 65
    • Jones, A.J.I.1    Pern, I.2
  • 15
    • 0019608720 scopus 로고
    • Formal models for computer security
    • September
    • C. Landwehr. Formal models for computer security. ACM Computing Surveys, 3: 247-278, September 1981.
    • (1981) ACM Computing Surveys , vol.3 , pp. 247-278
    • Landwehr, C.1
  • 16
    • 55849148289 scopus 로고
    • A Logical Analysis of Authorized and Prohibited Infbrmation Flows
    • Oakland
    • F. Cuppens. A Logical Analysis of Authorized and Prohibited Infbrmation Flows. In IEEE Symposium on Security and Privacy, Oakland, 1993.
    • (1993) IEEE Symposium on Security and Privacy
    • Cuppens, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.