메뉴 건너뛰기




Volumn 5, Issue 1, 2002, Pages 1-35

An Algebra for Composing Access Control Policies

Author keywords

Access Control; Algebra; Design; Logic Programs; Policy Composition; Security

Indexed keywords


EID: 85025424440     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/504909.504910     Document Type: Article
Times cited : (241)

References (22)
  • 3
    • 0040884892 scopus 로고    scopus 로고
    • A flexible authorization mechanism for relational data management systems
    • (April)
    • Bertino, E., Jajodia, S., and Samarati, P. 1999. A flexible authorization mechanism for relational data management systems. ACM Trans. Inf. Syst. 17, 2 (April), 101-140.
    • (1999) ACM Trans. Inf. Syst. , vol.17 , pp. 101-140
    • Bertino, E.1    Jajodia, S.2    Samarati, P.3
  • 8
    • 84983002492 scopus 로고    scopus 로고
    • Access control in configurable systems
    • J. Vitek and C. Jensen, Eds Springer-Verlag, New York
    • Jaeger, T. 1999. Access control in configurable systems. In Secure Internet Programming, J. Vitek and C. Jensen, Eds., Vol. 1603, Springer-Verlag, New York, 289-310.
    • (1999) Secure Internet Programming , vol.1603 , pp. 289-310
    • Jaeger, T.1
  • 9
    • 0001619596 scopus 로고    scopus 로고
    • A unified framework for supporting multiple access control policies
    • (June)
    • Jajodia, S., Samarati, P., Sapino, M., and Subrahmanian, V. 2001. A unified framework for supporting multiple access control policies. ACM Trans. Database Syst. 26, 2 (June), 214-260.
    • (2001) ACM Trans. Database Syst. , vol.26 , pp. 214-260
    • Jajodia, S.1    Samarati, P.2    Sapino, M.3    Subrahmanian, V.4
  • 10
    • 0002020664 scopus 로고
    • Elements of relational database theory
    • J. van Leeuwen, Ed., Elsevier, New York, Chapter 17
    • Kanellakis, P. 1990. Elements of relational database theory. In Handbook of Theoretical Computer Science, J. van Leeuwen, Ed., Elsevier, New York, Chapter 17.
    • (1990) Handbook of Theoretical Computer Science
    • Kanellakis, P.1
  • 11
    • 0019608720 scopus 로고
    • Formal models for computer security
    • (Sept.)
    • Landwehr, C. 1981. Formal models for computer security. Comput. Surv. 13, 3 (Sept.), 247-278.
    • (1981) Comput. Surv. , vol.13 , pp. 247-278
    • Landwehr, C.1
  • 15
    • 0003054727 scopus 로고
    • Access control policies for database systems
    • C. Landwehr, Ed., North-Holland, Amsterdam, The Netherlands
    • Lunt, T. 1989. Access control policies for database systems. In Database Security II: Status and Prospects, C. Landwehr, Ed., North-Holland, Amsterdam, The Netherlands, 41-52.
    • (1989) Database Security II: Status and Prospects , pp. 41-52
    • Lunt, T.1
  • 16
    • 0026119329 scopus 로고
    • A model of authorization for next-generation database systems
    • (March)
    • Rabitti, F., Bertino, E., Kim, W., and Woelk, D. 1991. A model of authorization for next-generation database systems. ACM Trans. Database Syst. 16, 1 (March), 89-131.
    • (1991) ACM Trans. Database Syst. , vol.16 , pp. 89-131
    • Rabitti, F.1    Bertino, E.2    Kim, W.3    Woelk, D.4
  • 18
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • (Nov.)
    • Sandhu, R. 1993. Lattice-based access control models. IEEE Computer 26, 11 (Nov.), 9-19.
    • (1993) IEEE Computer 26 , vol.11 , pp. 9-19
    • Sandhu, R.1
  • 22
    • 84974750564 scopus 로고
    • Authorizations in distributed systems: A new approach
    • Woo, T. and Lam, S. 1993. Authorizations in distributed systems: A new approach. J. Comput. Sec. 2, 2-3, 107-136.
    • (1993) J. Comput. Sec. , vol.2 , Issue.2-3 , pp. 107-136
    • Woo, T.1    Lam, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.