메뉴 건너뛰기




Volumn 6, Issue 3, 2003, Pages 327-364

Policy Management Using Access Control Spaces

Author keywords

Access control models; authorization mechanisms; Design; Management; role based access control; Security

Indexed keywords


EID: 84968352943     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/937527.937528     Document Type: Article
Times cited : (70)

References (36)
  • 1
    • 84956993736 scopus 로고    scopus 로고
    • Role-based authorization constraints specification
    • 4 (Nov. 2000
    • Ahn, G.-J., Sandhu, R., 2000. Role-based authorization constraints specification.ACM Trans. Inf. Syst. Security 3, 4 (Nov. 2000).
    • (2000) ACM Trans. Inf. Syst. Security , vol.3
    • Ahn, G.-J.1    Sandhu, R.2
  • 3
    • 84974776848 scopus 로고
    • The extended schematic protection model
    • Ammann, P., Sandhu, R., 1992. The extended schematic protection model.J. Comput. Security 1 (1992).
    • (1992) J. Comput. Security , vol.1
    • Ammann, P.1    Sandhu, R.2
  • 5
    • 0008724838 scopus 로고    scopus 로고
    • An authorization model for temporal and derived data: Securing information portals
    • 1 (Feb. 2002
    • Atluri, V., Gal, A., 2002. An authorization model for temporal and derived data: Securing information portals.ACM Trans. Inf. Syst. Security 5, 1 (Feb. 2002).
    • (2002) ACM Trans. Inf. Syst. Security , vol.5
    • Atluri, V.1    Gal, A.2
  • 6
    • 84865788031 scopus 로고    scopus 로고
    • A model of OASIS role-based access control and its support for active security
    • 4 (Nov. 2002
    • Bacon, J., Moody, K., Yao, W., 2002. A model of OASIS role-based access control and its support for active security.ACM Trans. Inf. Sys. Security 5, 4 (Nov. 2002).
    • (2002) ACM Trans. Inf. Sys. Security , vol.5
    • Bacon, J.1    Moody, K.2    Yao, W.3
  • 8
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations
    • ESD-TR-73-278, Mitre Corp. 1973
    • Bell, D., Lapadula, L., 1973. Secure computer systems: Mathematical foundations (Vol. 1). Tech. Rep. ESD-TR-73-278, Mitre Corp. 1973.
    • (1973) Tech. Rep. , vol.1
    • Bell, D.1    Lapadula, L.2
  • 10
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • MTR-3153, Mitre Corp. June 1975
    • Biba, K. J., 1975. Integrity considerations for secure computer systems. Tech. Rep. MTR-3153, Mitre Corp. June 1975.
    • (1975) Tech. Rep.
    • Biba, K.J.1
  • 11
    • 0004078695 scopus 로고    scopus 로고
    • The Key Note trust-management system
    • version 2. IETF RFC 2704, Sept. 1999
    • Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A., 1999. The Key Note trust-management system, version 2. IETF RFC 2704, Sept. 1999.
    • (1999)
    • Blaze, M.1    Feigenbaum, J.2    Ioannidis, J.3    Keromytis, A.4
  • 14
    • 0002422823 scopus 로고    scopus 로고
    • A role-based access control model and reference implementation within a corporate intranet
    • 1 (Feb. 1999
    • Ferraiolo, D., Barkley, J., Kuhn, D. R., 1999. A role-based access control model and reference implementation within a corporate intranet.ACM Trans. Inf. Syst. Security 2, 1 (Feb. 1999).
    • (1999) ACM Trans. Inf. Syst. Security , vol.2
    • Ferraiolo, D.1    Barkley, J.2    Kuhn, D.R.3
  • 19
    • 85006937063 scopus 로고    scopus 로고
    • Practical safety in flexible access control models
    • 2 (May 2001
    • Jaeger, T., Tidswell, J. E., 2001. Practical safety in flexible access control models.ACM Trans. Inf. Syst. Security 4, 2 (May 2001).
    • (2001) ACM Trans. Inf. Syst. Security , vol.4
    • Jaeger, T.1    Tidswell, J.E.2
  • 24
    • 85024274228 scopus 로고    scopus 로고
    • Decidability of safety in graph-based models for access control
    • 2002, Oct. 2002
    • Koch, M., Mancini, L., Parisi-Presicce, F., 2002. Decidability of safety in graph-based models for access control. In Proceedings of ESORICS 2002, Oct. 2002.
    • (2002) Proceedings of ESORICS
    • Koch, M.1    Mancini, L.2    Parisi-Presicce, F.3
  • 26
    • 0041524661 scopus 로고    scopus 로고
    • Delegation logic: A logic-based approach to distributed authorization
    • 1 (Feb. 2003
    • Li, N., Grosof, B., Feigenbaum, J., 2003. Delegation logic: A logic-based approach to distributed authorization.ACM Trans. Inf. Syst. Security 6, 1 (Feb. 2003).
    • (2003) ACM Trans. Inf. Syst. Security , vol.6
    • Li, N.1    Grosof, B.2    Feigenbaum, J.3
  • 29
    • 0001940210 scopus 로고    scopus 로고
    • The role graph model and conflict of interest
    • ACM, February 1999
    • Nyanchama, M., Osborn, S., 1999. The role graph model and conflict of interest.ACM Trans. Inf. Syst. Security 2, 1, ACM, February 1999.
    • (1999) ACM Trans. Inf. Syst. Security , vol.2 , Issue.1
    • Nyanchama, M.1    Osborn, S.2
  • 32
    • 33748161983 scopus 로고    scopus 로고
    • Configuring the SELinux policy
    • NAI Labs Rep. 02-007, available at www.nsa.gov/selinux. June 2002
    • Smalley, S., 2002. Configuring the SELinux policy. NAI Labs Rep. 02-007, available at www.nsa.gov/selinux. June 2002.
    • (2002)
    • Smalley, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.