메뉴 건너뛰기




Volumn 5, Issue 3, 2002, Pages 332-365

A Graph-Based Formalism for RBAC

Author keywords

Access control in information systems; Administration; Correctness; Decentralized; Design; Graph transformations; Management; Permission management; Role Based access control; Security

Indexed keywords


EID: 85008430937     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/545186.545191     Document Type: Article
Times cited : (104)

References (18)
  • 1
    • 0011560546 scopus 로고
    • The transitive reduction of a directed graph
    • AHO, A. V., GAREY, M. R., AND ULLMAN, J. D. 1972. The transitive reduction of a directed graph. SIAM J. Comput. 1, 2, 131-137.
    • (1972) SIAM J. Comput. , vol.1 , Issue.2 , pp. 131-137
    • Aho, A.V.1    Garey, M.R.2    Ullman, J.D.3
  • 2
    • 0025028340 scopus 로고
    • Naming & grouping privileges to simplify security management in large databases
    • IEEE Computer Society Press, Los Alamitos, Calif.
    • BALDWIN, R. 1990. Naming & grouping privileges to simplify security management in large databases. In Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, Los Alamitos, Calif., pp. 116-132.
    • (1990) Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy , pp. 116-132
    • Baldwin, R.1
  • 5
    • 0031611731 scopus 로고    scopus 로고
    • Formal specification for role based access control user/role and role/role relationship management
    • ACM, New York
    • GAVRILA, S. I. AND BARKLEY, J. F. 1998. Formal specification for role based access control user/role and role/role relationship management. In Proceedings of 3rd ACM Workshop on Role-Based Access Control. ACM, New York, pp. 81-90.
    • (1998) Proceedings of 3rd ACM Workshop on Role-Based Access Control , pp. 81-90
    • Gavrila, S.I.1    Barkley, J.F.2
  • 6
    • 84949934945 scopus 로고    scopus 로고
    • Refinements of graph transformation systems via rule expressions
    • H. Ehrig, G. Engels, H.-J. Kreowski, and G. Rozenberg, eds. Lecture Notes in Computer Science, Springer-Verlag, New York
    • GROSSE-RHODE, M., PARISI-PRESICCE, F., AND SIMEONI, M. 2000. Refinements of graph transformation systems via rule expressions. In Proceedings of TAGT'98, H. Ehrig, G. Engels, H.-J. Kreowski, and G. Rozenberg, eds. Lecture Notes in Computer Science, vol. 1764. Springer-Verlag, New York, pp. 368-382.
    • (2000) Proceedings of TAGT'98 , vol.1764 , pp. 368-382
    • Grosse-Rhode, M.1    Parisi-Presicce, F.2    Simeoni, M.3
  • 7
    • 18944376711 scopus 로고
    • Ensuring consistency of conditional graph grammars-A constructive approach
    • A. Corradini, and U. Montanari, eds. Elsevier North-Holland, Amsterdam, The Netherlands
    • HECKEL, R., AND WAGNER, A. 1995. Ensuring consistency of conditional graph grammars-A constructive approach. In Proceedings of SEGRAGRA'95, Volume 2 of Electronic Notes of TCS A. Corradini, and U. Montanari, eds. Elsevier North-Holland, Amsterdam, The Netherlands, pp. 95-103. http://www.elsevier.nl/locate/entcs/volume2.html.
    • (1995) Proceedings of SEGRAGRA'95, Volume 2 of Electronic Notes of TCS , pp. 95-103
    • Heckel, R.1    Wagner, A.2
  • 8
    • 84944075708 scopus 로고    scopus 로고
    • A formal model for role-based access control using graph transformation
    • F. Cuppens. et al. eds. Lecture Notes in Computer Science, Springer Verlag, New York
    • KOCH, M., MANCINI, L. V., AND PARISI-PRESICCE, F. 2000. A formal model for role-based access control using graph transformation. In Proceedings of the 6th European Symposium on Research in Computer Security (ESORICS 2000) F. Cuppens. et al. eds. Lecture Notes in Computer Science, vol. 1895. Springer Verlag, New York, pp. 122-139.
    • (2000) Proceedings of the 6th European Symposium on Research in Computer Security (ESORICS 2000) , vol.1895 , pp. 122-139
    • Koch, M.1    Mancini, L.V.2    Parisi-Presicce, F.3
  • 11
    • 0010573970 scopus 로고
    • Access right administration in role-based security systems
    • North Holland, Amsterdam, The Netherlands
    • NYANCHAMA, M., AND OSBORN, S. 1994. Access right administration in role-based security systems. In Proceedings of IFIP WG 11.3 Database Security, Vol. VIII. North Holland, Amsterdam, The Netherlands, pp. 37-56.
    • (1994) Proceedings of IFIP WG 11.3 Database Security , vol.8 , pp. 37-56
    • Nyanchama, M.1    Osborn, S.2
  • 12
    • 0001940210 scopus 로고    scopus 로고
    • The role graph model and conflict of interest
    • NYANCHAMA, M., AND OSBORN, S. 1999. The role graph model and conflict of interest. ACM Trans. Inf. Syst. Sec. 1, 2, 3-33.
    • (1999) ACM Trans. Inf. Syst. Sec. , vol.1 , Issue.2 , pp. 3-33
    • Nyanchama, M.1    Osborn, S.2
  • 13
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • OSBORN, S., SANDHU, R., AND MUNAWER, Q. 2000. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Inf. Syst. Sec. 3, 2, 85-106.
    • (2000) ACM Trans. Inf. Syst. Sec. , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.1    Sandhu, R.2    Munawer, Q.3
  • 15
    • 19344364618 scopus 로고    scopus 로고
    • Role-based access control
    • Academic Press, Orlands, Fla
    • SANDHU, R. S. 1998. Role-based access control. In Advances in Computers, Vol. 46. Academic Press, Orlands, Fla.
    • (1998) Advances in Computers , vol.46
    • Sandhu, R.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.