-
1
-
-
0033652039
-
The NIST model for role-based access control: Towards a unified standard
-
Phoenix, AZ
-
R. Sandhu, D. Ferraiolo, and D. Kuhn, The NIST model for role-based access control: towards a unified standard, In Proceedings of Fifth ACM Workshop on Role-Based Access Control (Phoenix, AZ), p. 47-63, 2000.
-
(2000)
Proceedings of Fifth ACM Workshop on Role-Based Access Control
, pp. 47-63
-
-
Sandhu, R.1
Ferraiolo, D.2
Kuhn, D.3
-
4
-
-
84944792110
-
TRBAC: A temporal role-based access control model
-
August
-
Elisa Bertino, Piero Andrea Bonatti, Elena Ferrari, TRBAC: A temporal role-based access control model, ACM Transactions on Information and System Security (TISSEC), v.4 n.3, p. 191-233, August 2001
-
(2001)
ACM Transactions on Information and System Security (TISSEC)
, vol.4
, Issue.3
, pp. 191-233
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
8
-
-
0030086382
-
Role-Based Access Control Models
-
February
-
R. Sandhu, Edward J. Coyne , Hal L. Feinstein, Charles E. Youman, Role-Based Access Control Models, Computer, v.29 n.2, p. 38-47, February 1996
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
9
-
-
0011590541
-
Role hierarchies and constraints for lattice-based access controls
-
ESORICS96,Rome, Italy, Sept., E. Bertino, Ed. Springer-Verlag, New York, NY
-
R. Sandhu, Role hierarchies and constraints for lattice-based access controls. In Proceedings of the Fourth European Symposium on Research in Computer Security (ESORICS96,Rome, Italy, Sept.), E. Bertino, Ed. Springer-Verlag, New York, NY, 1996.
-
(1996)
Proceedings of the Fourth European Symposium on Research in Computer Security
-
-
Sandhu, R.1
-
10
-
-
0029711136
-
A formal model for role-based access control with constraints
-
(Kenmare, Ireland,June). IEEE Press, Piscataway, NJ
-
L. Giuri and P. Iglio, A formal model for role-based access control with constraints. In Proceedings of 9th IEEE Workshop on Computer Security Foundations (Kenmare, Ireland,June). IEEE Press, Piscataway, NJ, p.136-145, 1996
-
(1996)
Proceedings of 9th IEEE Workshop on Computer Security Foundations
, pp. 136-145
-
-
Giuri, L.1
Iglio, P.2
-
11
-
-
84956993736
-
Role-based authorization constraints specification
-
Nov.
-
Gail-Joon Ahn, R. Sandhu, Role-based authorization constraints specification, ACM Transactions on Information and System Security (TISSEC), v.3 n.4, p.207-226, Nov. 2000
-
(2000)
ACM Transactions on Information and System Security (TISSEC)
, vol.3
, Issue.4
, pp. 207-226
-
-
Ahn, G.-J.1
Sandhu, R.2
-
12
-
-
84944792110
-
TRBAC: A temporal role-based access control model
-
August
-
Elisa Bertino, Piero Andrea Bonatti, Elena Ferrari, TRBAC: A temporal role-based access control model, ACM Transactions on Information and System Security (TISSEC), v.4 n.3, p. 191-233, August 2001
-
(2001)
ACM Transactions on Information and System Security (TISSEC)
, vol.4
, Issue.3
, pp. 191-233
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
13
-
-
0032153903
-
An access control model supporting periodicity constraints and temporal reasoning
-
Sept.
-
Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati, An access control model supporting periodicity constraints and temporal reasoning, ACM Transactions on Database Systems (TODS), v.23 n.3, p.231-285, Sept. 1998
-
(1998)
ACM Transactions on Database Systems (TODS)
, vol.23
, Issue.3
, pp. 231-285
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
15
-
-
0037502707
-
Generalized Framework for Access Control: Towards Prototyping the ORGCON Policy
-
Abrams, Marshall, et al., Generalized Framework for Access Control: Towards Prototyping the ORGCON Policy, Proceedings of the 14th National Computing Security Conference, p. 257-266, 1991.
-
(1991)
Proceedings of the 14th National Computing Security Conference
, pp. 257-266
-
-
Abrams, M.1
-
20
-
-
0242456740
-
Dependencies and separation of duty constraints in GTRBAC
-
James B. D. Joshi, Basil Shafiq, Arif Ghafoor, Elisa Bertino, Dependencies and separation of duty constraints in GTRBAC, Proceedings of the eighth ACM symposium on Access control models and technologies, p. 51-64, 2003
-
(2003)
Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies
, pp. 51-64
-
-
Joshi, J.B.D.1
Shafiq, B.2
Ghafoor, A.3
Bertino, E.4
|