메뉴 건너뛰기




Volumn 22, Issue 6, 2003, Pages 511-514

RBAC models - Concepts and trends

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER NETWORKS; DATABASE SYSTEMS; MATHEMATICAL MODELS;

EID: 0141972444     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0167-4048(03)00609-6     Document Type: Note
Times cited : (52)

References (13)
  • 2
    • 0002848811 scopus 로고    scopus 로고
    • An Approach for the Specification and Enforcement of Authorization Constraints in Workflow Management Systems
    • [BFA99] February
    • [BFA99] E. Bertlno, E. Ferrari, V. Atluri, "An Approach for the Specification and Enforcement of Authorization Constraints in Workflow Management Systems", ACM Transactions on Information and Systems Security, Vol.1, No.2, pp.65-104, February 1999.
    • (1999) ACM Transactions on Information and Systems Security , vol.1 , Issue.2 , pp. 65-104
    • Bertlno, E.1    Ferrari, E.2    Atluri, V.3
  • 8
    • 0026119329 scopus 로고
    • A Model of Authorization for Next-Generation Database Systems
    • [RBKW91] March
    • [RBKW91] F. Rabitti, E. Bertino, W. Kim, D. Woelk, "A Model of Authorization for Next-Generation Database Systems". ACM Trans, on Database Systems, Vol. 16, No. 1, pp. 88-131, March 1991.
    • (1991) ACM Trans. on Database Systems , vol.16 , Issue.1 , pp. 88-131
    • Rabitti, F.1    Bertino, E.2    Kim, W.3    Woelk, D.4
  • 12
    • 50249183308 scopus 로고    scopus 로고
    • Role Hierarchies and Constraints for Lattice-based Access Controls
    • [S96] In E. Bertino, H. Kurth, G. Martella, and E. Montolivo Eds., Computer Security-Esorics'96, Rome, Italy
    • [S96] R. Sandhu. "Role Hierarchies and Constraints for Lattice-based Access Controls". In E. Bertino, H. Kurth, G. Martella, and E. Montolivo Eds., Computer Security - Esorics'96, LNCS N. 1146, pages 65-79, Rome, Italy, 1996.
    • (1996) LNCS , vol.1146 , pp. 65-79
    • Sandhu, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.