메뉴 건너뛰기




Volumn 13, Issue 8, 2002, Pages 1521-1527

Role-based authorization constraint with time character

Author keywords

Access control; Constraint; Information security; Role; Time character

Indexed keywords

ALGORITHMS; COMPUTER NETWORKS; CONSTRAINT THEORY; MATHEMATICAL MODELS;

EID: 0036700077     PISSN: 10009825     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (19)

References (5)
  • 4
    • 0030086382 scopus 로고
    • Role-based access control models
    • Sandhu, R., Coyne, E.J., Feinstein, H.L., et al. Role-based access control models. IEEE Computer, 1995, 29(2): 38-47.
    • (1995) IEEE Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1    Coyne, E.J.2    Feinstein, H.L.3
  • 5
    • 0029425954 scopus 로고    scopus 로고
    • Constraints for role-based access control
    • MD: ACM Press
    • Chen, Fang, Sandhu, R. Constraints for role-based access control. In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996. 39-46.
    • (1996) Proceedings of the ACM RBAC Workshop , pp. 39-46
    • Chen, F.1    Sandhu, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.