Browse > Article

금융 어플리케이션을 위한 효율적인 역할추출과 안전한 역할기반 접근통제 적용 방안  

Jeong, Seong-Min (국민은행 정보보안팀)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 ANSI/INCITS 359-2004, 'Information Technology-Role Based Access Control, International Committee for Information Technology Standards', 2004
2 Bill Brenner, 'Societe Generale: A cautionary tale of insider threats', SearchSecurity.com, 2008
3 Gail-joon Ahn, R. S. Sandhu, 'The RSL99 Language for Role-Base Separartion of Duties constraints', In Proceedings of 4thACM Workshop on Role-Based Access Control, pp. 43-54, 1999
4 Seong-Min Jeong, Seung-Wan Han, Hyeong-Seok Lim, 'A Role Based Access Control Method Considering Task in the Mobile Agent-based Workflow System', ITC-CSCC(1), pp. 549-552, 2000
5 Warwick Pord, 'Computer Communications Security', pp. 149-158, Prentice Hall, 1994
6 ITU-T Rec. X.509 ISO/IEC 9594-8, 'The Directory:Public-key and Attribute Certificate Frameworks', 2001
7 D. F. Ferraiolo, J. A. Cugini. D. R. Kuhn, 'Rolebased access control : Features and Motivations', 11th Annual Computer Security Applications Conference, 1995
8 Venkata Bhamidipati, Ravi Sandhu, 'Push Architectures for User Role Assignment', Proceedings of the 23nd National Information System, 2004
9 Ferraiolo, Kuhn, Chandramouli, Role-Based Access Control Second Edition, pp. 326-359, pp. 171-183, pp. 213-237, ARTECH HOUSE, 2007
10 ITU-T Rec. X.812 ISO/IEC 10181-3:1996, 'Security frameworks in open systems: Access control Framework' 1996
11 R. S. Sandhu, E. J. Coyne, H. L. Feinstein, C. E. Youman,. 'Role-Based Access Control Models', IEEE Computer. Vol. 29. No. 2. pp. 38-47, 1996