메뉴 건너뛰기




Volumn , Issue , 1999, Pages 19-30

A Framework for Implementing Role-based Access Control Using CORBA Security Service

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL;

EID: 85131828501     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/319171.319174     Document Type: Conference Paper
Times cited : (17)

References (19)
  • 7
    • 0003400251 scopus 로고
    • Secure computer systems: Unified exposition and multics interpretation
    • [BL75] Bedford, MA, USA, March
    • [BL75] D. E. Bell and L. J. LaPadula. Secure computer systems: Unified exposition and multics interpretation. Technical Report ESD-TR-75-306, The MITRE Corporation, Bedford, MA, USA, March 1975.
    • (1975) Technical Report ESD-TR-75-306, The MITRE Corporation
    • Bell, D.E.1    LaPadula, L.J.2
  • 11
    • 85134025114 scopus 로고    scopus 로고
    • Analysis of authorization in CORBA security
    • [Kar96] Zurich Research Laboratory, December
    • [Kar96] Günter Karjoth. Analysis of authorization in CORBA security. Technical report, IBM Research Division, Zurich Research Laboratory, December 1996.
    • (1996) Technical report, IBM Research Division
    • Karjoth, G.1
  • 15
    • 35248814570 scopus 로고    scopus 로고
    • [Obj98] July OMG document number: formal/98-07-05
    • [Obj98] Object Managment Group. CORBAservices: Common Object Services, July 1998. OMG document number: formal/98-07-05.
    • (1998) CORBAservices: Common Object Services
  • 16
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • [SCFY96] February
    • [SCFY96] Ravi Sandhu, Edward Coyne, Hal Feinstein, and Charles Youman. Role-based access control models. IEEE Computer, 29(2):38-47, February 1996.
    • (1996) IEEE Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1    Coyne, E.2    Feinstein, H.3    Youman, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.