메뉴 건너뛰기




Volumn 8364 LNCS, Issue , 2014, Pages 19-34

Security@Runtime: A flexible MDE approach to enforce fine-grained security policies

Author keywords

Access Control; Java Security; Obligations; Security Domain Specific Language; Security Policies

Indexed keywords

ACCESS CONTROL; SECURITY SYSTEMS;

EID: 84958531967     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-04897-0_2     Document Type: Conference Paper
Times cited : (8)

References (36)
  • 2
    • 57349158498 scopus 로고    scopus 로고
    • An obligation model bridging access control policies and privacy policies
    • 133
    • Ni, Q., Bertino, E., Lobo, J.: An obligation model bridging access control policies and privacy policies. In: SACMAT 2008, p. 133 (2008)
    • (2008) Sacmat
    • Ni, Q.1    Bertino, E.2    Lobo, J.3
  • 4
    • 0033489650 scopus 로고    scopus 로고
    • SASI enforcement of security policies
    • Erlingsson, U., Schneider, F.B.: SASI enforcement of security policies. In: NSPW, pp. 87-95 (2000)
    • (2000) NSPW , pp. 87-95
    • Erlingsson, U.1    Schneider, F.B.2
  • 5
    • 33745267229 scopus 로고    scopus 로고
    • Composing security policies with polymer
    • Bauer, L., Ligatti, J., Walker, D.: Composing security policies with polymer. ACM SIGPLAN Notices 40(6), 305 (2005)
    • (2005) ACM SIGPLAN Notices , vol.40 , Issue.6 , pp. 305
    • Bauer, L.1    Ligatti, J.2    Walker, D.3
  • 7
    • 57349142384 scopus 로고    scopus 로고
    • Aspect-oriented in-lined reference monitors
    • Hamlen, K.W., Jones, M.: Aspect-oriented in-lined reference monitors. In: PLAS, p. 11 (2008)
    • (2008) PLAS , pp. 11
    • Hamlen, K.W.1    Jones, M.2
  • 8
    • 84865280730 scopus 로고    scopus 로고
    • Security-policy monitoring and enforcement with JavaMOP
    • Hussein, S., Meredith, P., Rolu, G.: Security-policy monitoring and enforcement with JavaMOP. In: PLAS, pp. 1-11 (2012)
    • (2012) PLAS , pp. 1-11
    • Hussein, S.1    Meredith, P.2    Rolu, G.3
  • 9
    • 35248828504 scopus 로고    scopus 로고
    • Aspect-oriented programming
    • Aķsit, M., Matsuoka, S. (eds.) ECOOP Springer, Heidelberg 1997
    • Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C., Lopes, C.V., Loingtier, J.M., Irwin, J.: Aspect-Oriented Programming. In: Aķsit, M., Matsuoka, S. (eds.) ECOOP 1997. LNCS, vol. 1241, pp. 220-242. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1241 , pp. 220-242
    • Kiczales, G.1    Lamping, J.2    Mendhekar, A.3    Maeda, C.4    Lopes, C.V.5    Loingtier, J.M.6    Irwin, J.7
  • 11
    • 56649117258 scopus 로고    scopus 로고
    • A model-based framework for security policy specification deployment and testing
    • Czarnecki, K., Ober, I., Bruel, J.-M., Uhl, A., V̈olter, M. (eds.) MODELS Springer, Heidelberg (2008
    • Mouelhi, T., Fleurey, F., Baudry, B., Le Traon, Y.: A model-based framework for security policy specification, deployment and testing. In: Czarnecki, K., Ober, I., Bruel, J.-M., Uhl, A., V̈olter, M. (eds.) MODELS 2008. LNCS, vol. 5301, pp. 537-552. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5301 , pp. 537-552
    • Mouelhi, T.1    Fleurey, F.2    Baudry, B.3    Le Traon, Y.4
  • 13
    • 79960151725 scopus 로고    scopus 로고
    • A decade of model-driven security
    • Basin, D., Clavel, M., Egea, M.: A decade of model-driven security. In: SACMAT 2011, pp. 1-10 (2011)
    • (2011) Sacmat , pp. 1-10
    • Basin, D.1    Clavel, M.2    Egea, M.3
  • 14
    • 38049059202 scopus 로고    scopus 로고
    • A Metamodel-based approach for analyzing security-design models
    • Engels, G., Opdyke, B., Schmidt, D.C., Weil, F. (eds.) MODELS Springer, Heidelberg (2007
    • Basin, D., Clavel, M., Doser, J., Egea, M.: A Metamodel-Based Approach for Analyzing Security-Design Models. In: Engels, G., Opdyke, B., Schmidt, D.C., Weil, F. (eds.) MODELS 2007. LNCS, vol. 4735, pp. 420-435. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4735 , pp. 420-435
    • Basin, D.1    Clavel, M.2    Doser, J.3    Egea, M.4
  • 15
    • 33947620690 scopus 로고    scopus 로고
    • Privacy APIs: Access control techniques to analyze and verify legal privacy policies
    • CSFW
    • May, M., Gunter, C., Lee, I.: Privacy APIs: Access control techniques to analyze and verify legal privacy policies. In: 19th IEEE Computer Security Foundations Workshop, CSFW 2006 (2006)
    • (2006) 19th IEEE Computer Security Foundations Workshop , pp. 2006
    • May, M.1    Gunter, C.2    Lee, I.3
  • 18
    • 70350600124 scopus 로고    scopus 로고
    • A formalization of HIPAA for a medical messaging system
    • Fischer-Ḧubner, S., Lambrinoudakis, C., Pernul, G. (eds.) Springer, Heidelberg (2009
    • Lam, P.E., Mitchell, J.C., Sundaram, S.: A formalization of HIPAA for a medical messaging system. In: Fischer-Ḧubner, S., Lambrinoudakis, C., Pernul, G. (eds.) TrustBus 2009. LNCS, vol. 5695, pp. 73-85. Springer, Heidelberg (2009)
    • (2009) TrustBus LNCS , vol.5695 , pp. 73-85
    • Lam, P.E.1    Mitchell, J.C.2    Sundaram, S.3
  • 20
    • 79955163100 scopus 로고    scopus 로고
    • UMLsec: Extending UML for secure systems development
    • J́eźequel, J.-M., Hussmann, H., Cook, S. (eds.) UML Springer, Heidelberg (2002
    • J̈urjens, J.: UMLsec: Extending UML for secure systems development. In: J́eźequel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412-425. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2460 , pp. 412-425
    • J̈urjens, J.1
  • 22
    • 84944754330 scopus 로고    scopus 로고
    • Modelling contexts in the Or-BAC model
    • Cuppens, F., Mìege, A.: Modelling contexts in the Or-BAC model. In: ACSAC, pp. 416-425 (2003)
    • (2003) Acsac , pp. 416-425
    • Cuppens, F.1
  • 30
    • 84861043720 scopus 로고    scopus 로고
    • Refactoring access control policies for performance improvement
    • Kateb, D.E., Mouelhi, T., Traon, Y.L., Hwang, J., Xie, T.: Refactoring access control policies for performance improvement. In: ICPE, pp. 323-334 (2012)
    • (2012) ICPE , pp. 323-334
    • Kateb, D.E.1    Mouelhi, T.2    Traon, Y.L.3    Hwang, J.4    Xie, T.5
  • 33
    • 84900644980 scopus 로고    scopus 로고
    • emfText
    • emfText, http://www.emftext.org/index.php/EMFText
  • 34
    • 84900583168 scopus 로고    scopus 로고
    • XSB Porlog
    • XSB Porlog, http://xsb.sourceforge.net
  • 35
    • 84900607512 scopus 로고    scopus 로고
    • interProlog
    • interProlog, http://www.declarativa.com/interprolog
  • 36
    • 84900649397 scopus 로고    scopus 로고
    • Extensible Access Control Markup Language (XACML) version 3.0
    • Extensible Access Control Markup Language (XACML) version 3.0, http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-cs-01-en.pdf


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.