메뉴 건너뛰기




Volumn 2, Issue 2, 1999, Pages 177-228

Flexible Control of Downloaded Executable Content

Author keywords

Access control models; authentication; authorization mechanisms; collaborative systems; Design; Management; role based access control; Security

Indexed keywords


EID: 85013593271     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/317087.317091     Document Type: Article
Times cited : (19)

References (52)
  • 2
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • (Feb.)
    • Bertino, E., Ferrari, E., and Atluri, V. 1999. The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 1, 2 (Feb.), 65-104
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 3
    • 0030092390 scopus 로고    scopus 로고
    • Checking for race conditions in file accesses
    • Bishop, M. and Dilger, M. 1996. Checking for race conditions in file accesses. Comput. Syst. 9, 2, 131-152
    • (1996) Comput. Syst. , vol.9 , Issue.2 , pp. 131-152
    • Bishop, M.1    Dilger, M.2
  • 5
    • 0026982115 scopus 로고
    • Computational mail as network infrastructure for computer-supported cooperative work
    • In Proceedings of the ACM Conference on Computer-Supported Cooperative Work (CSCW '92, Toronto, Canada, Oct. 31-Nov. 4), M. Mantel and R. Baecker, Eds. ACM Press, New York, NY
    • Borenstein, N. S. 1992. Computational mail as network infrastructure for computer-supported cooperative work. In Proceedings of the ACM Conference on Computer-Supported Cooperative Work (CSCW '92, Toronto, Canada, Oct. 31-Nov. 4), M. Mantel and R. Baecker, Eds. ACM Press, New York, NY, 67-74
    • (1992) , pp. 67-74
    • Borenstein, N.S.1
  • 6
    • 0028732129 scopus 로고
    • Email with a mind of its own: The Safe-Tcl language for enabled mail
    • Borenstein, N. S. 1994. Email with a mind of its own: The Safe-Tcl language for enabled mail. In ULPAA '94. 389-402
    • (1994) ULPAA '94 , pp. 389-402
    • Borenstein, N.S.1
  • 7
    • 0024663219 scopus 로고
    • The Chinese Wall security policy
    • In Proceedings of the IEEE Symposium on Research in Security and Privacy (Oakland, CA). IEEE Computer Society Press, Los Alamitos, CA
    • Brewer, D. F. C. and Nash, M. J. 1989. The Chinese Wall security policy. In Proceedings of the IEEE Symposium on Research in Security and Privacy (Oakland, CA). IEEE Computer Society Press, Los Alamitos, CA, 206-214
    • (1989) , pp. 206-214
    • Brewer, D.F.C.1    Nash, M.J.2
  • 9
    • 0029697575 scopus 로고    scopus 로고
    • Java security: From HotJava to Netscape and beyond
    • In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, CA, May). IEEE Press, Piscataway, NJ
    • Dean, D., Felten, E., and Wallach, D. 1996. Java security: From HotJava to Netscape and beyond. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, CA, May). IEEE Press, Piscataway, NJ
    • (1996)
    • Dean, D.1    Felten, E.2    Wallach, D.3
  • 10
    • 0000338326 scopus 로고
    • Programming semantics for multiprogrammed computations
    • (Mar.)
    • Dennis, J. B. and Van Horn, E. C. 1966. Programming semantics for multiprogrammed computations. Commun. ACM 9, 3 (Mar.), 143-155
    • (1966) Commun. ACM , vol.9 , Issue.3 , pp. 143-155
    • Dennis, J.B.1    Van Horn, E.C.2
  • 14
    • 3643075543 scopus 로고    scopus 로고
    • Penguin: Java done right
    • Gallo, F. S. 1996. Penguin: Java done right. Perl J. 1, 2, 10-12
    • (1996) Perl J. , vol.1 , Issue.2 , pp. 10-12
    • Gallo, F.S.1
  • 15
    • 0024984237 scopus 로고
    • An architecture for practical delegation in a distributed system
    • In Proceedings of the IEEE Symposium on Research in Security and Privacy (Oakland, CA). IEEE Computer Society Press, Los Alamitos, CA
    • Gasser, M. and Mcdermott, E. 1990. An architecture for practical delegation in a distributed system. In Proceedings of the IEEE Symposium on Research in Security and Privacy (Oakland, CA). IEEE Computer Society Press, Los Alamitos, CA, 20-30
    • (1990) , pp. 20-30
    • Gasser, M.1    Mcdermott, E.2
  • 16
    • 0031365182 scopus 로고    scopus 로고
    • Role templates for content-based access control
    • (RBAC '97, Fairfax, VA, Nov. 6-7, 1997), C. Youman, E. Coyne, and T. Jaeger, Eds. ACM Press, New York, NY
    • Giuri, L. and Iglio, P. 1997. Role templates for content-based access control. In Proceedings of the Second ACM Workshop on Role-based Access Control (RBAC '97, Fairfax, VA, Nov. 6-7, 1997), C. Youman, E. Coyne, and T. Jaeger, Eds. ACM Press, New York, NY, 153-159
    • (1997) Proceedings of the Second ACM Workshop on Role-based Access Control , pp. 153-159
    • Giuri, L.1    Iglio, P.2
  • 17
    • 0027002106 scopus 로고
    • Active mail-a framework for implementing groupware
    • In Proceedings of the ACM Conference on Computer-Supported Cooperative Work (CSCW '92, Toronto, Canada, Oct. 31-Nov. 4), M. Mantel and R. Baecker, Eds. ACM Press, New York, NY
    • Goldberg, Y., Safran, M., and Shapiro, E. 1992. Active mail-a framework for implementing groupware. In Proceedings of the ACM Conference on Computer-Supported Cooperative Work (CSCW '92, Toronto, Canada, Oct. 31-Nov. 4), M. Mantel and R. Baecker, Eds. ACM Press, New York, NY, 75-83
    • (1992) , pp. 75-83
    • Goldberg, Y.1    Safran, M.2    Shapiro, E.3
  • 18
    • 0031120737 scopus 로고    scopus 로고
    • Enclaves: Enabling secure communication over the internet
    • (Apr.)
    • Gong, L. 1997. Enclaves: Enabling secure communication over the internet. IEEE J. Sel. Areas Commun. 15, 3 (Apr.)
    • (1997) IEEE J. Sel. Areas Commun. , vol.15 , pp. 3
    • Gong, L.1
  • 19
    • 0003313661 scopus 로고    scopus 로고
    • Java security: Present and near future
    • Gong, L. 1997. Java security: Present and near future. IEEE Micro 17, 3, 14-19
    • (1997) IEEE Micro , vol.17 , Issue.3 , pp. 14-19
    • Gong, L.1
  • 20
    • 0003518498 scopus 로고    scopus 로고
    • The Java Language Specification
    • Addison-Wesley, Reading, MA
    • Gosling, J., Joy, B., and Steele, G. 1996. The Java Language Specification. Addison-Wesley, Reading, MA
    • (1996)
    • Gosling, J.1    Joy, B.2    Steele, G.3
  • 21
    • 0344001283 scopus 로고    scopus 로고
    • Providing policy-neutral and transparent access control in extensible systems
    • Technical Report Number UW-CSE-98-02-02. University of Washington, Seattle, WA
    • Grimm, R. and Bershad, B. N. 1998. Providing policy-neutral and transparent access control in extensible systems. Technical Report Number UW-CSE-98-02-02. University of Washington, Seattle, WA
    • (1998)
    • Grimm, R.1    Bershad, B.N.2
  • 22
    • 0030721196 scopus 로고    scopus 로고
    • A protection scheme for mobile agents on Java
    • (MOBICOM '97, Budapest, Hungary, Sept. 26-30, 1997), L. Pap, K. Sohraby, D. B. Johnson, and C. Rose, Eds. ACM Press, New York, NY
    • Hagimont, D. and Ismail, L. 1997. A protection scheme for mobile agents on Java. In Proceedings of the 3rd Annual ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM '97, Budapest, Hungary, Sept. 26-30, 1997), L. Pap, K. Sohraby, D. B. Johnson, and C. Rose, Eds. ACM Press, New York, NY, 215-222
    • (1997) Proceedings of the 3rd Annual ACM/IEEE International Conference on Mobile Computing and Networking , pp. 215-222
    • Hagimont, D.1    Ismail, L.2
  • 25
    • 0031234163 scopus 로고    scopus 로고
    • A flexible security model for using Internet content
    • (Sept.)
    • Islam, N., Anand, R., Jaeger, T., and Rao, J. R. 1997. A flexible security model for using Internet content. IEEE Softw. 14, 5 (Sept.)
    • (1997) IEEE Softw. , vol.14 , pp. 5
    • Islam, N.1    Anand, R.2    Jaeger, T.3    Rao, J.R.4
  • 27
    • 0031379041 scopus 로고    scopus 로고
    • A role-based access control model for protection domain derivation and management
    • (RBAC '97, Fairfax, VA, Nov. 6-7, 1997), C. Youman, E. Coyne, and T. Jaeger, Eds. ACM Press, New York, NY
    • Jaeger, T., Giraud, F., Islam, N., and Liedtke, J. 1997. A role-based access control model for protection domain derivation and management. In Proceedings of the Second ACM Workshop on Role-based Access Control (RBAC '97, Fairfax, VA, Nov. 6-7, 1997), C. Youman, E. Coyne, and T. Jaeger, Eds. ACM Press, New York, NY, 95-106
    • (1997) Proceedings of the Second ACM Workshop on Role-based Access Control , pp. 95-106
    • Jaeger, T.1    Giraud, F.2    Islam, N.3    Liedtke, J.4
  • 29
    • 84897398755 scopus 로고
    • Support for the file system security requirements of computational E-mail systems
    • In Proceedings of the 2nd ACM Conference on Computer and Communications Security (Fairfax, VA, Nov. 2-4), D. Denning, R. Pyle, R. Ganesan, and R. Sandhu, Eds. ACM Press, New York, NY
    • Jaeger, T. and Prakash, A. 1994. Support for the file system security requirements of computational E-mail systems. In Proceedings of the 2nd ACM Conference on Computer and Communications Security (Fairfax, VA, Nov. 2-4), D. Denning, R. Pyle, R. Ganesan, and R. Sandhu, Eds. ACM Press, New York, NY, 1-9
    • (1994) , pp. 1-9
    • Jaeger, T.1    Prakash, A.2
  • 30
    • 0029532185 scopus 로고
    • Implementation of a discretionary access control model for script-based systems
    • IEEE Computer Society Press, Los Alamitos, CA
    • Jaeger, T. and Prakash, A. 1995. Implementation of a discretionary access control model for script-based systems. In Proceedings of the 8th IEEE Workshop on Computer Security Foundations. IEEE Computer Society Press, Los Alamitos, CA, 70-84
    • (1995) Proceedings of the 8th IEEE Workshop on Computer Security Foundations , pp. 70-84
    • Jaeger, T.1    Prakash, A.2
  • 32
    • 0022583712 scopus 로고
    • On access checking in capability-based systems
    • In Proceedings of the 1986 IEEE Symposium on Security and Privacy (Oakland, CA, Apr. Press
    • Kain, R. Y. and Landwehr, C. E. 1986. On access checking in capability-based systems. In Proceedings of the 1986 IEEE Symposium on Security and Privacy (Oakland, CA, Apr. 7-9, 1986). IEEE Computer Society Press, Los Alamitos, CA, 95-100
    • (1986) IEEE Computer Society , Issue.7-9 , pp. 95-100
    • Kain, R.Y.1    Landwehr, C.E.2
  • 34
    • 0027557372 scopus 로고
    • Issues in the design of a toolkit for supporting multiple group editors
    • Knister, M. and Prakash, A. 1993. Issues in the design of a toolkit for supporting multiple group editors. Comput. Syst. 6, 2, 135-166
    • (1993) Comput. Syst. , vol.6 , Issue.2 , pp. 135-166
    • Knister, M.1    Prakash, A.2
  • 35
    • 84976834054 scopus 로고
    • Authentication in distributed systems: theory and practice
    • (Nov.)
    • Lampson, B., Abadi, M., Burrows, M., and Wobber, E. 1992. Authentication in distributed systems: theory and practice. ACM Trans. Comput. Syst. 10, 4 (Nov. 1992), 265-310
    • (1992) ACM Trans. Comput. Syst. , vol.10 , Issue.4 , pp. 265-310
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, E.4
  • 36
    • 0030388877 scopus 로고    scopus 로고
    • Supporting multi-user multi-applet workspaces in CBE
    • In Proceedings of the 6th ACM Conference on Computer-Supported Coorperative Work (CSCW '96, Boston MA, Nov.). ACM Press, New York, NY
    • Lee, J., Prakash, A., Jaeger, T., and Wu, G. 1996. Supporting multi-user multi-applet workspaces in CBE. In Proceedings of the 6th ACM Conference on Computer-Supported Coorperative Work (CSCW '96, Boston MA, Nov.). ACM Press, New York, NY, 344-353
    • (1996) , pp. 344-353
    • Lee, J.1    Prakash, A.2    Jaeger, T.3    Wu, G.4
  • 38
    • 85024257886 scopus 로고
    • Clans & chiefs
    • In Architektur von Rechensystemen. Springer-Verlag, Vienna, Austria
    • Liedtke, J. 1992. Clans & chiefs. In Architektur von Rechensystemen. Springer-Verlag, Vienna, Austria
    • (1992)
    • Liedtke, J.1
  • 39
    • 85024277528 scopus 로고
    • On-kernel construction
    • In Proceedings of the 15th ACM Symposium on Operating Systems Principles (SIGOPS '95, Copper Mountain Resort, CO, Dec. 3-6), M. B. Jones, Ed. ACM Press, New York, NY
    • Liedtke, J. 1995. On-kernel construction. In Proceedings of the 15th ACM Symposium on Operating Systems Principles (SIGOPS '95, Copper Mountain Resort, CO, Dec. 3-6), M. B. Jones, Ed. ACM Press, New York, NY
    • (1995)
    • Liedtke, J.1
  • 40
    • 0031382488 scopus 로고    scopus 로고
    • Reconciling role based management and role based access control
    • (RBAC '97, Fairfax, VA, Nov. 6-7, 1997), C. Youman, E. Coyne, and T. Jaeger, Eds. ACM Press, New York, NY
    • Lupu, E. and Sloman, M. 1997. Reconciling role based management and role based access control. In Proceedings of the Second ACM Workshop on Role-based Access Control (RBAC '97, Fairfax, VA, Nov. 6-7, 1997), C. Youman, E. Coyne, and T. Jaeger, Eds. ACM Press, New York, NY, 135-141
    • (1997) Proceedings of the Second ACM Workshop on Role-based Access Control , pp. 135-141
    • Lupu, E.1    Sloman, M.2
  • 43
    • 0003885069 scopus 로고
    • Tcl and the Tk Toolkit
    • Addison-Wesley Professional Computing Series. Addison-Wesley Longman Publ. Co., Inc., Reading, MA
    • Ousterhout, J. K. 1994. Tcl and the Tk Toolkit. Addison-Wesley Professional Computing Series. Addison-Wesley Longman Publ. Co., Inc., Reading, MA
    • (1994)
    • Ousterhout, J.K.1
  • 45
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • (Sept.)
    • Saltzer, J. H. and Schroeder, M. D. 1975. The protection of information in computer systems. Proc. IEEE 63, 9 (Sept.), 1278-1308
    • (1975) Proc. IEEE , vol.63 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 46
    • 0031600970 scopus 로고    scopus 로고
    • Role activation hierarchies
    • (RBAC '98, Fairfax, VA, Oct. 22-23, 1998), C. Youman and T. Jaeger, Eds. ACM Press, New York, NY
    • Sandhu, R. 1998. Role activation hierarchies. In Proceedings of the Third ACM Workshop on Role-Based Access Control (RBAC '98, Fairfax, VA, Oct. 22-23, 1998), C. Youman and T. Jaeger, Eds. ACM Press, New York, NY, 33-40
    • (1998) Proceedings of the Third ACM Workshop on Role-Based Access Control , pp. 33-40
    • Sandhu, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.