Browse > Article

산업제어시스템의 역할기반 접근제어 표준화 및 연구 동향  

Park, Gyeong-Won (동국대학교 정보통신공학과)
Im, Dae-Un (동국대학교 정보통신공학과)
Publication Information
The Magazine of the IEIE / v.42, no.8, 2015 , pp. 38-45 More about this Journal
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 IEC: 62351-8 Ed. 1.0 Power systems management and associated information exchange - Data and communications security - Part 8: Role-based access control (Draft) (2011)
2 MOYER, Matthew J.; ABAMAD, Mustaque. Generalized rolebased access control. In: Distributed Computing Systems, 2001. 21st International Conference on. IEEE, 2001. p. 391-398.
3 BERTINO, Elisa; BONATTI, Piero Andrea; FERRARI, Elena. TRBAC: A temporal role-based access control model. ACM Transactions on Information and System Security (TISSEC), 2001, 4.3: 191-233.   DOI
4 BONATTI, Piero; GALDI, Clemente; TORRES, Davide. ERBAC: event-driven RBAC. In: Proceedings of the 18th ACM symposium on Access control models and technologies. ACM, 2013. p. 125-136.
5 SHAFIQ, Basit, et al. A framework for verification and optimal reconfiguration of event-driven role based access control policies. In: Proceedings of the 17th ACM symposium on Access Control Models and Technologies. ACM, 2012. p. 197- 208.
6 AL-KAHTANI, Mohammad, et al. A model for attribute-based user-role assignment. In: Computer Security Applications Conference, 2002. Proceedings. 18th Annual. IEEE, 2002. p. 353-362.
7 AL-KAHTANI, Mohammad A.; SANDHU, Ravi. Induced role hierarchies with attribute-based RBAC. In: Proceedings of the eighth ACM symposium on Access control models and technologies. ACM, 2003. p. 142-148.
8 SANDHU, Ravi; FERRAIOLO, David; KUHN, Richard. The NIST model for role-based access control: towards a unified standard. In: ACM workshop on Role-based access control. 2000.
9 SCHREIVER, Jacob. Role Based Access Control and Authentication for SCADA Field Devices Using a Dual Bloom Filter and Challenge-response. 2012. PhD Thesis. University of Louisville.
10 ZHU, Yujia, et al. Role-based cryptosystem: a new cryptographic RBAC system based on role-key hierarchy. Information Forensics and Security, IEEE Transactions on, 2013, 8.12: 2138-2153.   DOI
11 IEEE: std 1815-2012 IEEE Standard for Electric Power systems communications - Distributed Network Protocol(DNP3), IEEE, 2012