-
2
-
-
0030086382
-
Role based access control models
-
SANDHU, R., COYNE, E.J., and FEINSTEIN, H.L.: 'Role based access control models', Computer, 1996, 29, (2), pp. 38-47
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
-
3
-
-
0031379040
-
Mandatory access control and role-based access control revisited
-
Fairfax, VA, USA
-
OSBORNE, S.: 'Mandatory access control and role-based access control revisited'. Proceedincs of the 2nd ACM RBAC Workshop, Fairfax, VA, USA, 1997, pp. 31-40
-
(1997)
Proceedincs of the 2nd ACM RBAC Workshop
, pp. 31-40
-
-
Osborne, S.1
-
4
-
-
33746976313
-
A three tier architecture for rolebased access control
-
Baltimore, MD, USA
-
SANDHU, R., and FEINSTEIN, H.: 'A three tier architecture for rolebased access control'. Proceedings of the 17th national computer security conference, Baltimore, MD, USA, 1994, pp. 34-46
-
(1994)
Proceedings of the 17th National Computer Security Conference
, pp. 34-46
-
-
Sandhu, R.1
Feinstein, H.2
-
5
-
-
0030644642
-
Separation of duty in role-based environments
-
Rockport, MAT USA, IEEE CS Press
-
SIMON, R., and ZURKO, M.: 'Separation of duty in role-based environments'. Proceeding of the 10th computer security foundations workshop, Rockport, MAT USA, 1997, IEEE CS Press, pp. 183-94
-
(1997)
Proceeding of the 10th Computer Security Foundations Workshop
, pp. 183-194
-
-
Simon, R.1
Zurko, M.2
-
6
-
-
0030677524
-
A logical language for expressing authorizations"
-
Oakland, CA, USA
-
JAJODIA, S., SMARATI, P., and SUBRAHMANIAN, V: 'A logical language for expressing authorizations". Proceedings of the IEE Symposium on Security and information privacy, 1997, Oakland, CA, USA, pp. 31 -4»2
-
(1997)
Proceedings of the IEE Symposium on Security and Information Privacy
, pp. 31-42
-
-
Jajodia, S.1
Smarati, P.2
Subrahmanian, V.3
-
7
-
-
0028699105
-
Role-based access control: A multi-dimensional view
-
Orlando, FL, USA, IEEE CS Press
-
SANDHU, R., COYNE, E., FEINSTEIN, H., and YOUMAN, C.: 'Role-based access control: A multi-dimensional view. 10th Annual computer security applications conference, Orlando, FL, USA, 1994, IEEE CS Press, pp. 54-61
-
(1994)
10th Annual Computer Security Applications Conference
, pp. 54-61
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
8
-
-
0345100243
-
Observations on the real-world implementation of role-based access control
-
Baltimore, MD, USA
-
H1LCHENBACH, B.: 'Observations on the real-world implementation of role-based access control'. Proceedings of the 20th National information systems security conference, 1997, Baltimore, MD, USA, pp. 341-52
-
(1997)
Proceedings of the 20th National Information Systems Security Conference
, pp. 341-352
-
-
Hilchenbach, B.1
-
9
-
-
0032629460
-
A user-centered, modular authorization service built on an RBAC foundation
-
Oakland, CA, USA
-
ZURKO, M., SIMON, R., and SANFILIPPO, T.: 'A user-centered, modular authorization service built on an RBAC foundation'. Proceedings of the IEEE symposium on Security and privacy, 1999, Oakland, CA, USA, pp. 57-71
-
(1999)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 57-71
-
-
Zurko, M.1
Simon, R.2
Sanfilippo, T.3
-
10
-
-
0030678389
-
A logic for state transformations in authorization policies
-
Rockport, MA, USA, IEEE, Computer Society Press
-
BAI, Y., and VARADHARAJAN, V: 'A logic for state transformations in authorization policies'. Proceedings of the 10th IEEE computer security foundations workshop, 1997, Rockport, MA, USA, IEEE, Computer Society Press, pp. 173-183
-
(1997)
Proceedings of the 10th IEEE Computer Security Foundations Workshop
, pp. 173-183
-
-
Bai, Y.1
Varadharajan, V.2
-
11
-
-
84944112469
-
Authorization for enterprise wide distributed systems: Design and application
-
ACSAC'98, Scottsdale, AZ, USA
-
VARADHARAJAN, V, CRALL, C., and PATO, J.: 'Authorization for enterprise wide distributed systems: Design and application. Proceedings of the IEEE computer security applications conference, ACSAC'98, 1998, Scottsdale, AZ, USA
-
(1998)
Proceedings of the IEEE Computer Security Applications Conference
-
-
Varadharajan, V.1
Crall, C.2
Pato, J.3
-
13
-
-
0023829318
-
Implementing commercial data integrity with secure capabilities
-
Oakland, CA, USA
-
KARGER, P.: 'Implementing commercial data integrity with secure capabilities'. Proceedings of the IEEE Symposium on Security and privacy, 1988, Oakland, CA, USA, pp. 130-39
-
(1988)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 130-139
-
-
Karger, P.1
-
14
-
-
0002357382
-
Role based access controls
-
Baltimore, MD, USA
-
FERRAIOLO, D., and KÜHN, R.: 'Role based access controls'. Proceedings of the 15th NIST-NCSC national computer security conference, 1992, Baltimore, MD, USA
-
(1992)
Proceedings of the 15th NIST-NCSC National Computer Security Conference
-
-
Ferraiolo, D.1
Kühn, R.2
-
15
-
-
0031600970
-
Role activation hierarchies
-
Fairfax, VA, USA
-
SANDHU, R.: 'Role activation hierarchies'. Proceedings of the 3rd ACM RBAC Workshop on Role based access control, 1998, Fairfax, VA, USA, pp. 33-40
-
(1998)
Proceedings of the 3rd ACM RBAC Workshop on Role Based Access Control
, pp. 33-40
-
-
Sandhu, R.1
-
16
-
-
0031365182
-
Role templates for content-based access control
-
Fairfax, VA, USA
-
GIURI, L., and IGLIO, P.: 'Role templates for content-based access control'. Proceedings of the 2nd ACM Workshop on Role based access control, 1997, Fairfax, VA, USA
-
(1997)
Proceedings of the 2nd ACM Workshop on Role Based Access Control
-
-
Giuri, L.1
Iglio, P.2
-
17
-
-
0024663219
-
The Chinese Wall security policy
-
Las Alamitos, CA, USA
-
BREWER, D., and NASH, M.: 'The Chinese Wall security policy', Proceedings of the IEEE Symposium on Security and privacy, 1989, pp. 206-214, Las Alamitos, CA, USA
-
(1989)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 206-214
-
-
Brewer, D.1
Nash, M.2
-
18
-
-
0026156775
-
Analysis of proxy problem in distributed systems
-
Las Alamitos, CA, USA
-
VARADHARAJAN, V., ALLEN, P., and BLACK, S.: 'Analysis of proxy problem in distributed systems', Proceedings of the IEEE Symposium on Security and privacy, 1991, Las Alamitos, CA, USA
-
(1991)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Varadharajan, V.1
Allen, P.2
Black, S.3
-
19
-
-
0346004750
-
Joint action based authorization schemes
-
VARADHARAJAN, V, and ALLEN, P.: 'Joint action based authorization schemes', ACM 30, Oper. Syst. Rev., 1996, 3, pp. 32-45
-
(1996)
ACM 30, Oper. Syst. Rev.
, vol.3
, pp. 32-45
-
-
Varadharajan, V.1
Allen, P.2
|