메뉴 건너뛰기




Volumn 2171 LNCS, Issue , 2001, Pages 137-196

Access control: Policies, models, and mechanisms

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY SYSTEMS;

EID: 84964853055     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45608-2_3     Document Type: Conference Paper
Times cited : (430)

References (93)
  • 3
    • 85031151129 scopus 로고    scopus 로고
    • The RSL99 language for role-based separation of duty constraints
    • Fairfax, VA, USA, October, 181
    • G. Ahn and R. Sandhu. The RSL99 language for role-based separation of duty constraints. In Proc. of the fourth ACM Workshop on Role-based Access Control, pages 43–54, Fairfax, VA, USA, October 1999. 181
    • (1999) Proc. of the Fourth ACM Workshop on Role-Based Access Control , pp. 43-54
    • Ahn, G.1    Sandhu, R.2
  • 5
    • 0004200684 scopus 로고
    • Technical Report ESD-TR-73-51, Electronic System Division/AFSC, Bedford, MA, October, 138
    • J. P. Anderson. Computer security technology planning study. Technical Report ESD-TR-73-51, Electronic System Division/AFSC, Bedford, MA, October 1972. 138
    • (1972) Computer Security Technology Planning Study
    • Anderson, J.P.1
  • 6
    • 85045339519 scopus 로고    scopus 로고
    • 171
    • Apache http server version 2.0. http://www.apache.org/docs-2.0/misc/tutorials.html. 171
  • 9
    • 0011312984 scopus 로고
    • Naming and grouping privileges to simplify security management in large database
    • Oakland, CA, April, 180, 181
    • Robert W. Baldwin. Naming and grouping privileges to simplify security management in large database. In Proceedings IEEE Computer Society Symposium on Research in Security and Privacy, pages 61–70, Oakland, CA, April 1990. 180, 181
    • (1990) Proceedings IEEE Computer Society Symposium on Research in Security and Privacy , pp. 61-70
    • Baldwin, R.W.1
  • 13
    • 0032153903 scopus 로고    scopus 로고
    • An access control model supporting periodicity constraints and temporal reasoning
    • September, 172, 173
    • E. Bertino, C. Bettini, E. Ferrari, and P. Samarati. An access control model supporting periodicity constraints and temporal reasoning. ACM Transactions on Database Systems, 23(3):231–285, September 1998. 172, 173
    • (1998) ACM Transactions on Database Systems , vol.23 , Issue.3 , pp. 231-285
    • Bertino, E.1    Bettini, C.2    Ferrari, E.3    Samarati, P.4
  • 15
    • 0030732547 scopus 로고    scopus 로고
    • An extended authorization model for relational databases
    • January-February, 177
    • E. Bertino, P. Samarati, and S. Jajodia. An extended authorization model for relational databases. IEEE-TKDE, 9(1):85–101, January-February 1997. 177
    • (1997) IEEE-TKDE , vol.9 , Issue.1 , pp. 85-101
    • Bertino, E.1    Samarati, P.2    Jajodia, S.3
  • 26
    • 0033723110 scopus 로고    scopus 로고
    • Design and implementation of an access control processor for XML documents
    • 191
    • E. Damiani, S. de Capitani di Vimercati, S. Paraboschi, and P. Samarati. Design and implementation of an access control processor for XML documents. Computer Networks, 33(1–6):59–75, June 2000. 191
    • (2000) Computer Networks , vol.33 , Issue.1-6 , pp. 59-75
    • Damiani, E.1    de Capitani Di Vimercati, S.2    Paraboschi, S.3    Samarati, P.4
  • 28
    • 84856551233 scopus 로고    scopus 로고
    • ISo/IEC 9075:1999, 177, 180, 181
    • Database language SQL – part 2: Foundation (SQL/foundation). ISO International Standard, ISo/IEC 9075:1999, 1999. 177, 180, 181
    • (1999) ISO International Standard
  • 31
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May, 149, 161, 164
    • D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236–243, May 1976. 149, 161, 164
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 33
    • 84937407052 scopus 로고
    • Commutative filters for reducing inference threats in multilevel database systems
    • 160
    • D. E. Denning. Commutative filters for reducing inference threats in multilevel database systems. In Proc. of the 1985 IEEE Symposium on Security and Privacy, pages 134–146, April 1985. 160
    • (1985) Proc. of the 1985 IEEE Symposium on Security and Privacy , pp. 134-146
    • Denning, D.E.1
  • 35
    • 0028404874 scopus 로고
    • A model for evaluation and administration of security in object-oriented databases
    • 169, 171
    • E. B. Fernandez, E. Gudes, and H. Song. A model for evaluation and administration of security in object-oriented databases. IEEE Transaction on Knowledge and Data Engineering, 6(2):275–292, 1994. 169, 171
    • (1994) IEEE Transaction on Knowledge and Data Engineering , vol.6 , Issue.2 , pp. 275-292
    • Fernandez, E.B.1    Gudes, E.2    Song, H.3
  • 37
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checker: A tool for the verification of information flow security properties
    • 161
    • R. Focardi and R. Gorrieri. The compositional security checker: A tool for the verification of information flow security properties. IEEE Transactions on Software Engineering, 23(9), September 1997. 161
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.9
    • Focardi, R.1    Gorrieri, R.2
  • 38
    • 0041901780 scopus 로고
    • C. E. Landwehr and S. Jajodia, editors, Database Security, V: Status and Prospects, North-Holland, Elsevier Science Publishers. 159
    • T. D. Garvey and T. F. Lunt. Cover stories for database security. In C. E. Landwehr and S. Jajodia, editors, Database Security, V: Status and Prospects, North-Holland, 1992. Elsevier Science Publishers. 159
    • (1992) Cover Stories for Database Security
    • Garvey, T.D.1    Lunt, T.F.2
  • 41
    • 84942812332 scopus 로고
    • AFIPS Press, editor, Proc. Spring Jt. Computer Conference, Montvale, N. J., 140
    • G. S. Graham and P. J. Denning. Protection – principles and practice. In AFIPS Press, editor, Proc. Spring Jt. Computer Conference, volume 40, pages 417–429, Montvale, N. J., 1972. 140
    • (1972) Protection – Principles and Practice , vol.40 , pp. 417-429
    • Graham, G.S.1    Denning, P.J.2
  • 42
    • 84976657250 scopus 로고
    • An authorization mechanism for a relational database system
    • 175
    • P. P. Griffiths and B. W. Wade. An authorization mechanism for a relational database system. ACM Transactions on Database Systems, 1(3):242–255, 1976. 175
    • (1976) ACM Transactions on Database Systems , vol.1 , Issue.3 , pp. 242-255
    • Griffiths, P.P.1    Wade, B.W.2
  • 43
    • 0009431182 scopus 로고
    • S. Jajodia and C. E. Landwehr, editors, Database Security, IV: Status and Prospects, North-Holland, Elsevier Science Publishers. 157
    • J. T. Haigh, R. C. O’Brien, and D. J. Thomsen. The LDV secure relational DBMS model. In S. Jajodia and C. E. Landwehr, editors, Database Security, IV: Status and Prospects, pages 265–279, North-Holland, 1991. Elsevier Science Publishers. 157
    • (1991) The LDV Secure Relational DBMS Model , pp. 265-279
    • Haigh, J.T.1    O’Brien, R.C.2    Thomsen, D.J.3
  • 45
  • 46
    • 0025065897 scopus 로고
    • Integrating an object-oriented data model with multilevel security
    • Oakland, CA, 166
    • S. Jajodia and B. Kogan. Integrating an object-oriented data model with multilevel security. In Proc. of the IEEE Symposium on Security and Privacy, pages 76–85, Oakland, CA, 1990. 166
    • (1990) Proc. of the IEEE Symposium on Security and Privacy , pp. 76-85
    • Jajodia, S.1    Kogan, B.2
  • 47
    • 0007664281 scopus 로고
    • Inference problems in multilevel secure database management systems
    • M. D. Abrams, S. Jajodia, and H. J. Podell, editors, IEEE Computer Society Press, 159
    • S. Jajodia and C. Meadows. Inference problems in multilevel secure database management systems. In M. D. Abrams, S. Jajodia, and H. J. Podell, editors, Information Security: An Integrated Collection of Essays, pages 570–584. IEEE Computer Society Press, 1995. 159
    • (1995) Information Security: An Integrated Collection of Essays , pp. 570-584
    • Jajodia, S.1    Meadows, C.2
  • 51
    • 0023168930 scopus 로고
    • Limiting the damage potential of discretionary Trojan Horses
    • Oakland, CA, 164
    • P. A. Karger. Limiting the damage potential of discretionary Trojan Horses. In Proc. IEEE Symposium on Security and Privacy, pages 32–37, Oakland, CA, 1987. 164
    • (1987) Proc. IEEE Symposium on Security and Privacy , pp. 32-37
    • Karger, P.A.1
  • 52
    • 84976667065 scopus 로고
    • Share resource matrix methodology: An approach to identifying storage and timing channels
    • April, 161
    • R. Kemmerer. Share resource matrix methodology: an approach to identifying storage and timing channels. ACM Transactions on Computer Systems, 1(3):256– 277, April 1983. 161
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3 , pp. 256-277
    • Kemmerer, R.1
  • 53
  • 54
    • 0019608720 scopus 로고
    • Formal models for computer security
    • C. E. Landwehr. Formal models for computer security. ACM Computing Surveys, 13(3):247–278, 1981. 138
    • (1981) ACM Computing Surveys , vol.13 , Issue.3 , pp. 247-278
    • Landwehr, C.E.1
  • 58
    • 0041177826 scopus 로고
    • Access control policies: Some unanswered questions
    • Franconia, NH, June, 168
    • Teresa Lunt. Access control policies: Some unanswered questions. In IEEE Computer Security Foundations Workshop II, pages 227–245, Franconia, NH, June 1988. 168
    • (1988) IEEE Computer Security Foundations Workshop II , pp. 227-245
    • Lunt, T.1
  • 59
    • 0024663399 scopus 로고
    • Aggregation and inference: Facts and fallacies
    • Oakland, CA, 159
    • T. F. Lunt. Aggregation and inference: Facts and fallacies. In Proc. IEEE Symposium on Security and Privacy, pages 102–109, Oakland, CA, 1989. 159
    • (1989) Proc. IEEE Symposium on Security and Privacy , pp. 102-109
    • Lunt, T.F.1
  • 60
    • 84878950991 scopus 로고
    • Polyinstantiation: An inevitable part of a multilevel world
    • Franconia, New Hampshire, June, 155
    • T. F. Lunt. Polyinstantiation: an inevitable part of a multilevel world. In Proc. Of the IEEE Workshop on computer Security Foundations, pages 236–238, Franconia, New Hampshire, June 1991. 155
    • (1991) Proc. of the IEEE Workshop on Computer Security Foundations , pp. 236-238
    • Lunt, T.F.1
  • 63
    • 0025211594 scopus 로고
    • The specification and modeling of computer security
    • 153
    • J. McLean. The specification and modeling of computer security. Computer, 23(1):9–16, January 1990. 153
    • (1990) Computer , vol.23 , Issue.1 , pp. 9-16
    • McLean, J.1
  • 66
    • 85045302382 scopus 로고
    • Redwood City, CA, Version 7.0, January, 159
    • Oracle Corporation, Redwood City, CA. Trusted Oracle7 Server Administration Guide, Version 7.0, January 1993. 159
    • (1993) Trusted Oracle7 Server Administration Guide
  • 67
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • 181
    • S. Osborn, R. Sandhu, and Q. Munawer. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security, 3(2):85–106, 2000. 181
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.1    Sandhu, R.2    Munawer, Q.3
  • 68
    • 48349113295 scopus 로고
    • Technical Report NIST special publication 800-8, Institute of Standards and Technology, 160
    • W. R. Polk and L. E. Bassham. Security issues in the database language SQL. Technical Report NIST special publication 800-8, Institute of Standards and Technology, 1993. 160
    • (1993) Security Issues in the Database Language SQL
    • Polk, W.R.1    Bassham, L.E.2
  • 70
    • 0005092487 scopus 로고
    • A model of authorization for next-generation database systems
    • March, 167, 169
    • F. Rabitti, E. Bertino, W. Kim, and D. Woelk. A model of authorization for next-generation database systems. ACM TODS, 16(1):89–131, March 1991. 167, 169
    • (1991) ACM TODS , vol.16 , Issue.1 , pp. 89-131
    • Rabitti, F.1    Bertino, E.2    Kim, W.3    Woelk, D.4
  • 72
  • 78
    • 0037510581 scopus 로고    scopus 로고
    • Authentication, access control and intrusion detection
    • A. Tucker, editor, CRC Press Inc
    • R. Sandhu and P. Samarati. Authentication, access control and intrusion detection. In A. Tucker, editor, CRC Handbook of Computer Science and Engineering, pages 1929–1948. CRC Press Inc., 1997.
    • (1997) CRC Handbook of Computer Science and Engineering , pp. 1929-1948
    • Sandhu, R.1    Samarati, P.2
  • 79
    • 0024125647 scopus 로고
    • Transaction control expressions for separation of duties
    • Orlando, FL, December, 183
    • Ravi S. Sandhu. Transaction control expressions for separation of duties. In Fourth Annual Computer Security Application Conference, pages 282–286, Orlando, FL, December 1988. 183
    • (1988) Fourth Annual Computer Security Application Conference , pp. 282-286
    • Sandhu, R.S.1
  • 80
    • 0030086382 scopus 로고    scopus 로고
    • Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. Role-based access control models
    • February
    • Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. Role-based access control models. IEEE Computer, 29(2):38–47, February 1996. 181
    • (1996) IEEE Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.S.1
  • 83
    • 85045300405 scopus 로고    scopus 로고
    • 171
    • Security. http://java.sun.com/products/jdk/1.2/docs/guide/security/index.html. 171
  • 85
    • 0019658399 scopus 로고
    • Access flow: A protection model which integrates access control and information flow
    • Oakland, CA, 164
    • A. Stoughton. Access flow: A protection model which integrates access control and information flow. In Proc. of the IEEE Symposium on Security and Privacy, pages 9–18, Oakland, CA, 1981. 164
    • (1981) Proc. of the IEEE Symposium on Security and Privacy , pp. 9-18
    • Stoughton, A.1
  • 90
    • 0028720693 scopus 로고
    • Formal query languages for secure relational databases
    • December, 159
    • M. Winslett, K. Smith, and X. Qian. Formal query languages for secure relational databases. ACM Transactions on Database Systems, 19(4):626–662, December 1994. 159
    • (1994) ACM Transactions on Database Systems , vol.19 , Issue.4 , pp. 626-662
    • Winslett, M.1    Smith, K.2    Qian, X.3
  • 91
    • 84974750564 scopus 로고
    • Authorizations in distributed systems: A new approach
    • 184
    • T. Y. C. Woo and S. S. Lam. Authorizations in distributed systems: A new approach. Journal of Computer Security, 2(2,3):107–136, 1993. 184
    • (1993) Journal of Computer Security , vol.2 , Issue.2-3 , pp. 107-136
    • Woo, T.Y.C.1    Lam, S.S.2
  • 93
    • 0034449542 scopus 로고    scopus 로고
    • An efficient complete strategy for automated trust negotiation over the internet
    • Athens, Greece, November, 190
    • T. Yu, X. Ma, and M. Winslett. An efficient complete strategy for automated trust negotiation over the internet. In Proceedings of 7th ACM Computer and Communication Security, Athens, Greece, November 2000. 190
    • (2000) Proceedings of 7Th ACM Computer and Communication Security
    • Yu, T.1    Ma, X.2    Winslett, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.