메뉴 건너뛰기




Volumn , Issue , 2003, Pages 43-50

Specifying and enforcing constraints in role-based access control

Author keywords

Authorization constraint; Enforcement context; Role based access control; Separation of duty constraint

Indexed keywords

COMPUTER HARDWARE DESCRIPTION LANGUAGES; COMPUTER SIMULATION; INFORMATION MANAGEMENT; OBJECT ORIENTED PROGRAMMING; SEMANTICS; SET THEORY;

EID: 0242540379     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/775418.775419     Document Type: Conference Paper
Times cited : (103)

References (16)
  • 3
    • 0003400251 scopus 로고
    • Secure computer systems: Unified exposition and multics interpretation
    • Tech. Rep. MTR-2997, Mitre Corporation, Bedford, Massachusetts
    • Bell, D., and LaPadula, L. Secure computer systems: Unified exposition and Multics interpretation. Tech. Rep. MTR-2997, Mitre Corporation, Bedford, Massachusetts, 1976.
    • (1976)
    • Bell, D.1    LaPadula, L.2
  • 4
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • Bertino, E., Ferrari, E., and Atluri, V. The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security 2, 1 (1999), 65-104.
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 7
    • 25544433397 scopus 로고    scopus 로고
    • Structural complexity of conflict of interest policies
    • Tech. Rep. BBKCS-00-07, Birkbeck College, University of London
    • Crampton, J., and Loizou, G. Structural complexity of conflict of interest policies. Tech. Rep. BBKCS-00-07, Birkbeck College, University of London, 2000.
    • (2000)
    • Crampton, J.1    Loizou, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.