메뉴 건너뛰기




Volumn 2218, Issue , 2001, Pages 295-310

Access control and trust in the use of widely distributed services

Author keywords

[No Author keywords available]

Indexed keywords

CHEMICAL ACTIVATION; MIDDLEWARE; NETWORK SECURITY;

EID: 84957006898     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45518-3_16     Document Type: Conference Paper
Times cited : (30)

References (17)
  • 1
    • 84944039217 scopus 로고    scopus 로고
    • Translating role-based access control policy within context
    • volume 1995 of Lecture Notes in Computer Science, Springer-Verlag
    • J. Bacon, M. Lloyd, and K. Moody. Translating role-based access control policy within context. In Proceedings of Policy 2001, Policies for Distributed Systems and Networks, volume 1995 of Lecture Notes in Computer Science, pages 107–119. Springer-Verlag, 2001
    • (2001) Proceedings of Policy 2001, Policies for Distributed Systems and Networks , pp. 107-119
    • Bacon, J.1    Lloyd, M.2    Moody, K.3
  • 6
    • 0002422823 scopus 로고    scopus 로고
    • A role-based access control model and reference implementation within a corporate intranet
    • Feb
    • D. F. Ferraiolo, J. F. Barkley, and D. R. Kuhn. A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Information and System Security, 2(1):34–64, Feb 1999.
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.1 , pp. 34-64
    • Ferraiolo, D.F.1    Barkley, J.F.2    Kuhn, D.R.3
  • 7
    • 0031365182 scopus 로고    scopus 로고
    • Role templates for content-based access control
    • Fairfax, Virginia, November
    • L. Giuri and P. Iglio. Role templates for content-based access control. In Second ACM Workshop on Role-Based Access Control, pages 153–159, Fairfax, Virginia, November 1997.
    • (1997) Second ACM Workshop on Role-Based Access Control , pp. 153-159
    • Giuri, L.1    Iglio, P.2
  • 10
    • 84944075856 scopus 로고    scopus 로고
    • An architecture for distributed OASIS services
    • volume 1795 of Lecture Notes in Computer Science
    • J. Hine, W. Yao, J. Bacon, and K. Moody. An architecture for distributed OASIS services. In Middleware 2000, volume 1795 of Lecture Notes in Computer Science, pages 104–120, 2000.
    • (2000) Middleware 2000 , pp. 104-120
    • Hine, J.1    Yao, W.2    Bacon, J.3    Moody, K.4
  • 11
    • 0002848803 scopus 로고    scopus 로고
    • The uses of role hierarchies in access control
    • Fairfax, Virginia, October
    • J. D. Moffett and E. C. Lupu. The uses of role hierarchies in access control. In Fourth ACM Workshop on Role-Based Access Control, pages 153–160, Fairfax, Virginia, October 1999.
    • (1999) Fourth ACM Workshop on Role-Based Access Control , pp. 153-160
    • Moffett, J.D.1    Lupu, E.C.2
  • 12
    • 0010573970 scopus 로고
    • Access rights administration in role-based security systems
    • J. Biskup, M. Morgernstern, and C. Landwehr, editors
    • M. Nyanchama and S. Osborn. Access rights administration in role-based security systems. In J. Biskup, M. Morgernstern, and C. Landwehr, editors, Database Security VIII: Status and Prospects, 1995.
    • (1995) Database Security VIII: Status and Prospects
    • Nyanchama, M.1    Osborn, S.2
  • 16
    • 0030644642 scopus 로고    scopus 로고
    • Separation of duty in role-based environments
    • Rockport, Massachusetts, June
    • R. T. Simon and M. E. Zurko. Separation of duty in role-based environments. In 10th IEEE Computer Security Foundations Workshop, pages 183–194, Rockport, Massachusetts, June 1997.
    • (1997) 10Th IEEE Computer Security Foundations Workshop , pp. 183-194
    • Simon, R.T.1    Zurko, M.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.