-
4
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
S.Osbom, R. Sandhu and Munawer, "Configuring Role-based Access Control to enforce Mandatory and discretionary Access Control policies." ACM Transaction on Information and System Security, Vol 3, no. 2, 2000, pp85-106.
-
(2000)
ACM Transaction on Information and System Security
, vol.3
, Issue.2
, pp. 85-106
-
-
Osbom, S.1
Sandhu, R.2
Munawer3
-
5
-
-
50249183308
-
Role hierarchies and constraints for lattice based access control
-
computer Security-ESORICS 96, Springer Verlag
-
R. Sandhu, "Role Hierarchies and Constraints for Lattice based access control". In computer Security-ESORICS 96, Springer Verlag, 1996, Lecture Notes 1146, pp65-79.
-
(1996)
Lecture Notes
, vol.1146
, pp. 65-79
-
-
Sandhu, R.1
-
7
-
-
71449117058
-
An object-oriented RBAC model for distributed systems
-
2001 IEEE/IFIP Conference on software architecture, Netherland, August
-
Chang. N. Zhang and Cungang Yang, "An Object-oriented RBAC Model for Distributed Systems", 2001 IEEE/IFIP Conference on software architecture, WICSA 2001, Netherland, August 2001, pp24-32.
-
(2001)
WICSA 2001
, pp. 24-32
-
-
Zhang, C.N.1
Yang, C.2
-
8
-
-
0036851073
-
Designing of a complete model of object oriented role-based access control system for distributed networks
-
accepted and will be published in Nov.
-
Chang. N. Zhang and Cungang Yang, "Designing of a Complete Model of Object Oriented Role-based Access Control System for Distributed Networks", Journal of Information Science and Engineering (JISE), accepted and will be published in Nov. 2002.
-
(2002)
Journal of Information Science and Engineering (JISE)
-
-
Zhang, C.N.1
Yang, C.2
-
9
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
D. E. Denning, "A lattice Model of Secure information flow." Communication of the ACM, 19(5), May 1976, pp236-243.
-
(1976)
Communication of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
10
-
-
0017517624
-
Certification of programs for secure information flow
-
Uly
-
D. E. Denning and P. J. Denning, "Certification of programs for secure information flow." Communication of ACM, 20(7), Uly, 1977, pp504-513.
-
(1977)
Communication of ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
11
-
-
0034545418
-
Information flow in inference for free
-
ACM
-
Potter, F. and Conchon, "Information flow in inference for free," ICFPOO, ACM, 2000, pp46-57.
-
(2000)
ICFPOO
, pp. 46-57
-
-
Potter, F.1
Conchon2
-
12
-
-
0034835461
-
A new type system for secure information flow
-
Cape Breton, Nova Scotia, June 2001. IEEE
-
Smith, G., "A new type system for secure information flow", In Proc. 14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, June 2001. IEEE, 2001, pp115-125.
-
(2001)
Proc. 14th IEEE Computer Security Foundations Workshop
, pp. 115-125
-
-
Smith, G.1
-
13
-
-
0025065897
-
Integrating an object-oriented data model with multilevel security
-
Oakland, CA, May
-
Jajodia, S. and Kogan B. "Integrating an object-oriented data model with multilevel security," Proc. IEEE Symp. on Sucurity and Privacy, Oakland, CA, May 1990.
-
(1990)
Proc. IEEE Symp. on Sucurity and Privacy
-
-
Jajodia, S.1
Kogan, B.2
|