메뉴 건너뛰기




Volumn 13, Issue 3, 2003, Pages 313-325

Adding flexibility in information flow control for object-oriented systems using versions

Author keywords

Access control; Computer security; Confidentiality; Information flow; Object oriented systems security; Privacy

Indexed keywords

DATABASE SYSTEMS; ELECTRONIC COMMERCE; INFORMATION USE; MOBILE COMPUTING; OBJECT ORIENTED PROGRAMMING; SECURITY OF DATA;

EID: 8644283675     PISSN: 02181940     EISSN: None     Source Type: Journal    
DOI: 10.1142/S0218194003001317     Document Type: Article
Times cited : (14)

References (22)
  • 2
    • 0036434226 scopus 로고    scopus 로고
    • Information flow analysis on role-based access control model
    • C. N. Zhang and C. Yang, "Information flow analysis on role-based access control model", Information Management and Control Security 10(5) (2002) 225-236.
    • (2002) Information Management and Control Security , vol.10 , Issue.5 , pp. 225-236
    • Zhang, C.N.1    Yang, C.2
  • 3
    • 71449117058 scopus 로고    scopus 로고
    • An object-oriented RBAC model for distributed systems
    • (WIGSA), Amsterdam, The Netherlands
    • C. N. Zhang and C. Yang, "An object-oriented RBAC model for distributed systems", Working IEEE/IFIP Conference on Software Architecture, (WIGSA), Amsterdam, The Netherlands, 2001, pp. 24-32.
    • (2001) Working IEEE/IFIP Conference on Software Architecture , pp. 24-32
    • Zhang, C.N.1    Yang, C.2
  • 4
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • S. Osborn, R. Sandhu, and Munawer, "Configuring role-based access control to enforce mandatory and discretionary access control policies", ACM Trans. on Information and System Security 3(2) (2000) 85-106.
    • (2000) ACM Trans. on Information and System Security , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.1    Sandhu, R.2    Munawer3
  • 6
    • 0034835461 scopus 로고    scopus 로고
    • A new type system for secure information flow
    • Cape Breton, Nova Scotia
    • G. Smith, "A new type system for secure information flow", in Proc. 14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, 2001, pp. 115-125.
    • (2001) Proc. 14th IEEE Computer Security Foundations Workshop , pp. 115-125
    • Smith, G.1
  • 11
    • 0001048139 scopus 로고    scopus 로고
    • Protecting privacy using the decentralized label model
    • A. C. Myers and B. Liskov, "Protecting privacy using the decentralized label model", ACM TOSEM 9(4) (2000) 410-442.
    • (2000) ACM TOSEM , vol.9 , Issue.4 , pp. 410-442
    • Myers, A.C.1    Liskov, B.2
  • 12
    • 0031682833 scopus 로고    scopus 로고
    • Complete, safe information flow with decentralized labels
    • Oakland, California
    • A. C. Myers and B. Liskov, "Complete, safe information flow with decentralized labels", in Proc. IEEE S&P, Oakland, California, 1998.
    • (1998) Proc. IEEE S&P
    • Myers, A.C.1    Liskov, B.2
  • 15
    • 0000052619 scopus 로고    scopus 로고
    • Authentication, access control, and audit
    • March
    • R. Sandhu and P. Samarati, "Authentication, access control, and audit", ACM Computing Surveys 28, No. 1, March 1996.
    • (1996) ACM Computing Surveys , vol.28 , Issue.1
    • Sandhu, R.1    Samarati, P.2
  • 16
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. E. Denning, "A lattice model of secure information flow", Comm. ACM 19(5) (1976) 236-243.
    • (1976) Comm. ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 17
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • D. E. Denning and P. J. Denning, "Certification of programs for secure information flow", Comm. ACM20(7) (1977) 504-513.
    • (1977) Comm. ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 18
    • 0030708182 scopus 로고    scopus 로고
    • Providing flexibility in information flow control for object-oriented systems
    • Oakland, CA, USA, May
    • E. Ferrari, P. Samarati, E. Bertino, and S. Jajodia, "Providing flexibility in information flow control for object-oriented systems", in Proc. IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 1997, pp. 130-140.
    • (1997) Proc. IEEE Symposium on Security and Privacy , pp. 130-140
    • Ferrari, E.1    Samarati, P.2    Bertino, E.3    Jajodia, S.4
  • 20
    • 0002422823 scopus 로고    scopus 로고
    • A role-based access control model and reference implementation within a corporate intranet
    • Feb.
    • D. F. Ferraiolo, J. F. Barkley, and D. R. Kuhn, "A role-based access control model and reference implementation within a corporate intranet", ACM Trans. on Information and Systems Security 2, No. 1, Feb. 1999.
    • (1999) ACM Trans. on Information and Systems Security , vol.2 , Issue.1
    • Ferraiolo, D.F.1    Barkley, J.F.2    Kuhn, D.R.3
  • 21
    • 8644265634 scopus 로고    scopus 로고
    • Information flow control using versions in object-oriented systems
    • Department of Mathematics & Computer Science, UAE University, Al-Ain, UAE, June
    • A. Maamir, A. Fellah, and I. Rahwan, "Information flow control using versions in object-oriented systems", Technical Report (CS#9P), Department of Mathematics & Computer Science, UAE University, Al-Ain, UAE, June 1999.
    • (1999) Technical Report (CS#9P)
    • Maamir, A.1    Fellah, A.2    Rahwan, I.3
  • 22
    • 0025065897 scopus 로고
    • Integrating an object-oriented data model with multilevel security
    • Oakland, CA, USA
    • S. Jajodia and B. Kogan, "Integrating an object-oriented data model with multilevel security", in Proc. IEEE Symp. on Security and Privacy, Oakland, CA, USA, 1990, pp. 76-85.
    • (1990) Proc. IEEE Symp. on Security and Privacy , pp. 76-85
    • Jajodia, S.1    Kogan, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.