메뉴 건너뛰기




Volumn , Issue TOOL 34, 2000, Pages 295-305

A role-based security architecture for business intelligence

Author keywords

[No Author keywords available]

Indexed keywords

COMPETITIVE INTELLIGENCE; COMPUTER ARCHITECTURE; DATA WAREHOUSES; DECISION MAKING; DISTRIBUTED COMPUTER SYSTEMS; ELECTRONIC COMMERCE; INFORMATION MANAGEMENT; INTERNET; SECURITY OF DATA;

EID: 0034586831     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/TOOLS.2000.868980     Document Type: Conference Paper
Times cited : (3)

References (20)
  • 1
    • 0021194887 scopus 로고
    • The viable system model: Its provenance, development, methodology and pathology
    • S. Beer, "The viable system model: Its provenance, development, methodology and pathology", Journal of Operational Research Society, 1984, 35(1) pp.7-25.
    • (1984) Journal of Operational Research Society , vol.35 , Issue.1 , pp. 7-25
    • Beer, S.1
  • 4
    • 0002422823 scopus 로고    scopus 로고
    • A role-based access control model and reference implementation within a corporate intranet
    • February
    • D.F. Ferrailo, J.F. Barkley, and D.R. Kuhn, "A role-Based Access control Model and reference implementation within a corporate intranet", ACM Transaction on Information System Security, February 1999, Vol. 2(1) pp.34-64.
    • (1999) ACM Transaction on Information System Security , vol.2 , Issue.1 , pp. 34-64
    • Ferrailo, D.F.1    Barkley, J.F.2    Kuhn, D.R.3
  • 8
    • 84961354851 scopus 로고    scopus 로고
    • Enterprise security architecture
    • Management: Policy, Standards and Organization
    • W.H. Murray, "Enterprise Security Architecture", Handbook of Information Security Management: Policy, Standards and Organization, 1998.
    • (1998) Handbook of Information Security
    • Murray, W.H.1
  • 11
    • 0010536362 scopus 로고    scopus 로고
    • Security moving from database systems to ERP systems
    • IEEE CS Press
    • R. van de Riet. and W. Janssen, "Security Moving from Database Systems to ERP Systems", DEXA'98, IEEE CS Press, 1998, pp. 273-280.
    • (1998) DEXA'98 , pp. 273-280
    • Van de Riet, R.1    Janssen, W.2
  • 12
    • 0028513932 scopus 로고
    • Access controls: Principles and practice
    • September
    • R. Sandhu and P. Samarati, "Access controls: Principles and practice", IEEE Communication, September 1994 Vol. 32(9).
    • (1994) IEEE Communication , vol.32 , Issue.9
    • Sandhu, R.1    Samarati, P.2
  • 13
    • 0000052619 scopus 로고    scopus 로고
    • Authentication, access control and audit
    • R. Sandhu, and P. Samarati, "Authentication, Access Control and Audit", ACM Computing Surveys, 1996, Volume 28(1), pp. 241-243.
    • (1996) ACM Computing Surveys , vol.28 , Issue.1 , pp. 241-243
    • Sandhu, R.1    Samarati, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.