메뉴 건너뛰기




Volumn , Issue , 2005, Pages 196-205

Verification and change-impact analysis of access-control policies

Author keywords

Access control policies; Change impact analysis; Decision diagram; Verification; XACML

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; COMPUTER SOFTWARE; DECISION MAKING; QUERY LANGUAGES;

EID: 85088054290     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1062455.1062502     Document Type: Conference Paper
Times cited : (67)

References (31)
  • 2
    • 33244479658 scopus 로고    scopus 로고
    • Evaluating XACML as a policy language
    • OASIS, Mar. Document identifier: wd-xacml-wspleval-03
    • A. Anderson. Evaluating XACML as a policy language. Technical report, OASIS, Mar. 2003. Document identifier: wd-xacml-wspleval-03.
    • (2003) Technical Report
    • Anderson, A.1
  • 5
    • 0022769976 scopus 로고
    • Graph based algorithms for boolean function manipulation
    • R. E. Bryant. Graph based algorithms for boolean function manipulation. IEEE Transactions on Computers, C35(8):677-691, 1986.
    • (1986) IEEE Transactions on Computers , vol.C35 , Issue.8 , pp. 677-691
    • Bryant, R.E.1
  • 6
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • D. D. Clark and D. R. Wilson. A comparison of commercial and military computer security policies. In IEEE Symposium of Security and Privacy, pages 184-194, 1987.
    • (1987) IEEE Symposium of Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 10
    • 24644452174 scopus 로고    scopus 로고
    • Model-checking access control policies
    • Lecture Notes in Computer Science. Springer-Verlag, Sept.
    • D. P. Guelev, M. D. Ryan, and P.-Y. Schobbens. Model-checking access control policies. In Information Security Conference, Lecture Notes in Computer Science. Springer-Verlag, Sept. 2004.
    • (2004) Information Security Conference
    • Guelev, D.P.1    Ryan, M.D.2    Schobbens, P.-Y.3
  • 13
    • 33244469750 scopus 로고    scopus 로고
    • Enabling complex UI in Web applications with send/suspend/dispatch
    • P. W. Hopkins. Enabling complex UI in Web applications with send/suspend/dispatch. In Scheme Workshop, 2003.
    • (2003) Scheme Workshop
    • Hopkins, P.W.1
  • 15
    • 33244455252 scopus 로고    scopus 로고
    • Automated verification of access control policies
    • University of California, Santa Barbara
    • G. Hughes and T. Bultan. Automated verification of access control policies. Technical Report 2004-22, University of California, Santa Barbara, 2004.
    • (2004) Technical Report , vol.2004 , Issue.22
    • Hughes, G.1    Bultan, T.2
  • 17
    • 0032010255 scopus 로고    scopus 로고
    • Isomorph-free model enumeration: A new method for checking relational specifications
    • Mar.
    • D. Jackson, S. Jha, and C. A. Damon. Isomorph-free model enumeration: A new method for checking relational specifications. ACM Transactions on Programming Languages and Systems, 20(2):302-343, Mar. 1998.
    • (1998) ACM Transactions on Programming Languages and Systems , vol.20 , Issue.2 , pp. 302-343
    • Jackson, D.1    Jha, S.2    Damon, C.A.3
  • 23
    • 33244491046 scopus 로고    scopus 로고
    • Tools and techniques for analyzing type enforcement policies in security enhanced Linux
    • Dec.
    • F. Mayer. Tools and techniques for analyzing type enforcement policies in security enhanced Linux. In Annual Computer Security Applications Conference, Dec. 2003.
    • (2003) Annual Computer Security Applications Conference
    • Mayer, F.1
  • 24
    • 2442512413 scopus 로고    scopus 로고
    • Extensible Access Control Markup Language (XACML) version 1.0
    • OASIS, Feb.
    • T. Moses, extensible Access Control Markup Language (XACML) version 1.0. Technical report, OASIS, Feb. 2003.
    • (2003) Technical Report
    • Moses, T.1
  • 29
    • 0242625217 scopus 로고    scopus 로고
    • A lightweight approach to specification and analysis of role-based access control extensions
    • A. Schaad and J. D. Moffett. A lightweight approach to specification and analysis of role-based access control extensions. In Symposium on Access Control Models and Technologies, pages 13-22, 2002.
    • (2002) Symposium on Access Control Models and Technologies , pp. 13-22
    • Schaad, A.1    Moffett, J.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.