-
1
-
-
84944792110
-
TRBAC: A Temporal Role-based Access Control Model
-
[BBF01] August
-
[BBF01] E. Bertino, P. Bonatti, and E. Ferrari. "TRBAC: A Temporal Role-based Access Control Model", ACM Transactions on Information and Systems Security, Vol.4, No.3, August 2001.
-
(2001)
ACM Transactions on Information and Systems Security
, vol.4
, Issue.3
-
-
Bertino, E.1
Bonatti, P.2
Ferrari, E.3
-
2
-
-
0002848811
-
An Approach for the Specification and Enforcement of Authorization Constraints in Workflow Management Systems
-
[BFA99] February
-
[BFA99] E. Bertlno, E. Ferrari, V. Atluri, "An Approach for the Specification and Enforcement of Authorization Constraints in Workflow Management Systems", ACM Transactions on Information and Systems Security, Vol.1, No.2, pp.65-104, February 1999.
-
(1999)
ACM Transactions on Information and Systems Security
, vol.1
, Issue.2
, pp. 65-104
-
-
Bertlno, E.1
Ferrari, E.2
Atluri, V.3
-
3
-
-
0141876269
-
Generalized Role-Based Access Control for Securing Future Applications
-
[CMA00] Baltimore, MD, October
-
[CMA00] M. J. Covington, M. J. Moyer, and M. Ahamad. "Generalized Role-Based Access Control for Securing Future Applications". In Proc. of the 2000 National Information Systems Security Conference, Baltimore, MD, October 2000.
-
(2000)
Proc. of the 2000 National Information Systems Security Conference
-
-
Covington, M.J.1
Moyer, M.J.2
Ahamad, M.3
-
8
-
-
0026119329
-
A Model of Authorization for Next-Generation Database Systems
-
[RBKW91] March
-
[RBKW91] F. Rabitti, E. Bertino, W. Kim, D. Woelk, "A Model of Authorization for Next-Generation Database Systems". ACM Trans, on Database Systems, Vol. 16, No. 1, pp. 88-131, March 1991.
-
(1991)
ACM Trans. on Database Systems
, vol.16
, Issue.1
, pp. 88-131
-
-
Rabitti, F.1
Bertino, E.2
Kim, W.3
Woelk, D.4
-
12
-
-
50249183308
-
Role Hierarchies and Constraints for Lattice-based Access Controls
-
[S96] In E. Bertino, H. Kurth, G. Martella, and E. Montolivo Eds., Computer Security-Esorics'96, Rome, Italy
-
[S96] R. Sandhu. "Role Hierarchies and Constraints for Lattice-based Access Controls". In E. Bertino, H. Kurth, G. Martella, and E. Montolivo Eds., Computer Security - Esorics'96, LNCS N. 1146, pages 65-79, Rome, Italy, 1996.
-
(1996)
LNCS
, vol.1146
, pp. 65-79
-
-
Sandhu, R.1
-
13
-
-
0242625215
-
Temporal Hierarchy and Inheritance Semantics for GTRBAC
-
[JBG02] Monterrey (CA, USA), June 3-4, ACM Press
-
th ACM Symposium on Access Control Models and Methodologies, Monterrey (CA, USA), June 3-4, 2002, ACM Press.
-
(2002)
th ACM Symposium on Access Control Models and Methodologies
-
-
Joshi, J.D.1
Bertino, E.2
Ghafoor, E.3
|