메뉴 건너뛰기




Volumn , Issue , 1998, Pages

Unified support for heterogeneous security policies in distributed systems

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; DISTRIBUTED COMPUTER SYSTEMS; SECURITY SYSTEMS; SOFTWARE AGENTS;

EID: 85084161655     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (34)

References (23)
  • 2
    • 0027810202 scopus 로고
    • The process group approach to reliable distributed computing
    • December
    • K.P. Birman. The process group approach to reliable distributed computing. Communications of the ACM, 36(12):36-53, December 1993.
    • (1993) Communications of the ACM , vol.36 , Issue.12 , pp. 36-53
    • Birman, K.P.1
  • 5
  • 6
    • 84976795329 scopus 로고
    • Protection in the HYDRA operating system
    • ACM, Nov.
    • E. Cohen and D. Jefferson. Protection in the HYDRA operating system. In Operating Systems Principles, pages 141-160. ACM, Nov. 1975.
    • (1975) Operating Systems Principles , pp. 141-160
    • Cohen, E.1    Jefferson, D.2
  • 7
    • 0030680628 scopus 로고    scopus 로고
    • The specification and implementation of 'commercial' security requirements including dynamic segregation of duties
    • April (to appear)
    • S. Foley. The specification and implementation of 'commercial' security requirements including dynamic segregation of duties. In Proceedings of the 4th A CM Conference on Computer and Communications Security, April 1997. (to appear).
    • (1997) Proceedings of the 4th A CM Conference on Computer and Communications Security
    • Foley, S.1
  • 12
  • 13
  • 18
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • November
    • Ravi Sandhu. Lattice-based access control models. IEEE Computer, November 1993.
    • (1993) IEEE Computer
    • Sandhu, R.1
  • 19
    • 0025564050 scopus 로고
    • Implementing fault tolerant services using the state Machine approach
    • F.B. Schneider. Implementing fault tolerant services using the state machine approach. ACM Computing Surveys, 22(4):300-319, 1990.
    • (1990) ACM Computing Surveys , vol.22 , Issue.4 , pp. 300-319
    • Schneider, F.B.1
  • 22
    • 0038650651 scopus 로고
    • Dyad: A system for using physically secure coprocessors
    • CMU
    • J.D. Tygar and B. Yee. Dyad: A system for using physically secure coprocessors. Technical Report CMU-CS-91-140R, CMU, 1991.
    • (1991) Technical Report CMU-CS-91-140R
    • Tygar, J.D.1    Yee, B.2
  • 23
    • 0004196480 scopus 로고
    • PhD thesis, Carnegie Mellon University, May
    • B. Yee. Using Secure Coprocessors. PhD thesis, Carnegie Mellon University, May 1994.
    • (1994) Using Secure Coprocessors
    • Yee, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.