메뉴 건너뛰기




Volumn , Issue , 2012, Pages 157-168

Risk-based security decisions under uncertainty

Author keywords

access control; classification; decision; risk

Indexed keywords

LEARNING SYSTEMS;

EID: 85139863684     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2133601.2133622     Document Type: Conference Paper
Times cited : (62)

References (33)
  • 7
    • 85139870260 scopus 로고    scopus 로고
    • GetAccess design and administration guide
    • September
    • Entrust. GetAccess design and administration guide, September 1999.
    • (1999) Entrust
  • 10
    • 85075837457 scopus 로고    scopus 로고
    • Botminer: clustering analysis of network trafic for protocol-and structure-independent botnet detection
    • USENIX Association
    • G. Gu, R. Perdisci, J. Zhang, and W. Lee. Botminer: clustering analysis of network trafic for protocol-and structure-independent botnet detection. In Proceedings of the 17th conference on Security symposium, pages 139-154. USENIX Association, 2008.
    • (2008) Proceedings of the 17th conference on Security symposium , pp. 139-154
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 11
    • 2942624556 scopus 로고    scopus 로고
    • Access control with IBM Tivoli Access Manager
    • May
    • G. Karjoth. Access control with IBM Tivoli Access Manager. ACM Trans. Inf. Syst. Secur., 6: 232-257, May 2003.
    • (2003) ACM Trans. Inf. Syst. Secur. , vol.6 , pp. 232-257
    • Karjoth, G.1
  • 14
    • 0030353831 scopus 로고    scopus 로고
    • Secure Computer Systems: A Mathematical Model
    • L. LaPadula and D. Bell. Secure Computer Systems: A Mathematical Model. Journal of Computer Security, 4: 239-263, 1996.
    • (1996) Journal of Computer Security , vol.4 , pp. 239-263
    • LaPadula, L.1    Bell, D.2
  • 15
    • 80052077852 scopus 로고    scopus 로고
    • Trading in risk: Using markets to improve access control
    • I. Molloy, P.-C. Cheng, and P. Rohatgi. Trading in risk: Using markets to improve access control. In NSPW, 2008.
    • (2008) NSPW
    • Molloy, I.1    Cheng, P.-C.2    Rohatgi, P.3
  • 16
    • 85139841228 scopus 로고    scopus 로고
    • Siteminder concepts guide
    • Netegrity. Siteminder concepts guide, 2000.
    • (2000) Netegrity
  • 17
    • 70450284416 scopus 로고    scopus 로고
    • Automating role-based provisioning by learning from examples
    • B. Carminati and J. Joshi, editors, ACM
    • Q. Ni, J. Lobo, S. B. Calo, P. Rohatgi, and E. Bertino. Automating role-based provisioning by learning from examples. In B. Carminati and J. Joshi, editors, SACMAT, pages 75-84. ACM, 2009.
    • (2009) SACMAT , pp. 75-84
    • Ni, Q.1    Lobo, J.2    Calo, S.B.3    Rohatgi, P.4    Bertino, E.5
  • 20
    • 79951951140 scopus 로고    scopus 로고
    • Safeway Inc, January 3
    • Safeway Inc. Annual report for the fiscal year ended January 3, 2009. http://http://www. sec. gov/Archives/edgar/data/86144/000119312509043434/d10k. htm.
    • (2009) Annual report for the fiscal year ended
  • 21
    • 79951951140 scopus 로고    scopus 로고
    • Supervalu Inc, February 28
    • Supervalu Inc. Annual report for the fiscal year ended February 28, 2009. http://www. sec. gov/Archives/edgar/data/95521/000095015209004223/c50531e10vk. htm.
    • (2009) Annual report for the fiscal year ended
  • 22
    • 85139865204 scopus 로고    scopus 로고
    • The Great Atlantic & Pacific Tea Company Inc
    • The Great Atlantic & Pacific Tea Company Inc. Fiscal 2008 Annual Report to Stockholders. http://www. sec. gov/Archives/edgar/data/43300/000139843209000171/ex13. Txt.
    • Fiscal 2008 Annual Report to Stockholders
  • 23
    • 79951951140 scopus 로고    scopus 로고
    • The Kroger Co, January 31
    • The Kroger Co. ANNUAL REPORT for the fiscal year ended January 31, 2009. http://www. sec. gov/Archives/edgar/data/56873/000110465909021710/a09-1837 110k. htm.
    • (2009) ANNUAL REPORT for the fiscal year ended
  • 32
    • 33646124011 scopus 로고    scopus 로고
    • An authorization framework for sharing data in web service federations
    • W. Jonker and M. Petkovic, editors. Springer
    • M. Wimmer and A. Kemper. An authorization framework for sharing data in web service federations. In W. Jonker and M. Petkovic, editors, Secure Data Management, volume 3674 of Lecture Notes in Computer Science, pages 47-62. Springer, 2005.
    • (2005) Secure Data Management, volume 3674 of Lecture Notes in Computer Science , pp. 47-62
    • Wimmer, M.1    Kemper, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.