-
1
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Feb.
-
Bertino, E., Ferrari, E., and Atluri, V. The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Info. Syst. Security 2, 1 (Feb. 1999), 65-104.
-
(1999)
ACM Trans. Info. Syst. Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
2
-
-
84968461696
-
Protecting information on the Web
-
Nov.
-
Bertino, E., Pagani, E., Rossi, G.P., and Samarati, P. Protecting information on the Web. Commun. ACM 43, 11 (Nov. 2000), 189-199.
-
(2000)
Commun. ACM
, vol.43
, Issue.11
, pp. 189-199
-
-
Bertino, E.1
Pagani, E.2
Rossi, G.P.3
Samarati, P.4
-
3
-
-
0002422823
-
A role-based access control model and reference implementation within a corporate intranet
-
Feb.
-
Ferraiolo, D.F., Barkley, J.F., and Kuhn, D.R. A role-based access control model and reference implementation within a corporate intranet. ACM Trans. Info. Syst. Security 2, 1 (Feb. 1999), 34-64.
-
(1999)
ACM Trans. Info. Syst. Security
, vol.2
, Issue.1
, pp. 34-64
-
-
Ferraiolo, D.F.1
Barkley, J.F.2
Kuhn, D.R.3
-
5
-
-
0016984825
-
Protection in operating systems
-
Oct.
-
Harrison, M.H., Ruzzo, W.L., and Ullman, J.D. Protection in operating systems. Commun. ACM 19, 8 (Oct. 1976), 461-471.
-
(1976)
Commun. ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.H.1
Ruzzo, W.L.2
Ullman, J.D.3
-
8
-
-
0027699087
-
Lattice-based access control models
-
Sandhu, R. Lattice-based access control models. IEEE Computer 26, 11 (1993).
-
(1993)
IEEE Computer
, vol.26
, Issue.11
-
-
Sandhu, R.1
-
9
-
-
0031232270
-
A role-based access control for intranet security
-
Sept.-Oct.
-
Tari, Z. and Chan, S. A role-based access control for intranet security. IEEE Intemet Computing (Sept.-Oct. 1997), 24-34.
-
(1997)
IEEE Intemet Computing
, pp. 24-34
-
-
Tari, Z.1
Chan, S.2
-
10
-
-
0002841051
-
Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management
-
Lake Tahoe, CA, Aug.
-
Thomas, R.K. and Sandhu, R.S. Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management. In Proceedings of the IFIP WG11.3 Workshop on Database Security (Lake Tahoe, CA, Aug. 1997).
-
(1997)
Proceedings of the IFIP WG11.3 Workshop on Database Security
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
11
-
-
0033361961
-
Using public-key infrastructure for security and risk management
-
Sept.
-
Wing, P. and O'Higgins, B. Using public-key infrastructure for security and risk management. IEEE Communications Magazine, (Sept. 1999), 71-73.
-
(1999)
IEEE Communications Magazine
, pp. 71-73
-
-
Wing, P.1
O'Higgins, B.2
|