-
2
-
-
84956993736
-
Role-based authorization constraints specification
-
Ahn, G.-J., and Sandhu, R. Role-based authorization constraints specification. ACM Transactions on Information and System Security 3, 4 (2000), 207-226.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 207-226
-
-
Ahn, G.-J.1
Sandhu, R.2
-
3
-
-
0003400251
-
Secure computer systems: Unified exposition and multics interpretation
-
Tech. Rep. MTR-2997, Mitre Corporation, Bedford, Massachusetts
-
Bell, D., and LaPadula, L. Secure computer systems: Unified exposition and Multics interpretation. Tech. Rep. MTR-2997, Mitre Corporation, Bedford, Massachusetts, 1976.
-
(1976)
-
-
Bell, D.1
LaPadula, L.2
-
4
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Bertino, E., Ferrari, E., and Atluri, V. The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security 2, 1 (1999), 65-104.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
5
-
-
0024663219
-
The Chinese wall security policy
-
IEEE Computer Society Press
-
Brewer, D., and Nash, M. The Chinese Wall security policy. In Proceedings of 1989 IEEE Symposium on Security and Privacy (Oakland, California, 1989), IEEE Computer Society Press, pp. 206-214.
-
Proceedings of 1989 IEEE Symposium on Security and Privacy (Oakland, California, 1989)
, pp. 206-214
-
-
Brewer, D.1
Nash, M.2
-
6
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
Clark, D., and Wilson, D. A comparison of commercial and military computer security policies. In Proceedings of 1987 IEEE Symposium on Security and Privacy (Oakland, California, 1987), pp. 184-194.
-
Proceedings of 1987 IEEE Symposium on Security and Privacy (Oakland, California, 1987)
, pp. 184-194
-
-
Clark, D.1
Wilson, D.2
-
7
-
-
25544433397
-
Structural complexity of conflict of interest policies
-
Tech. Rep. BBKCS-00-07, Birkbeck College, University of London
-
Crampton, J., and Loizou, G. Structural complexity of conflict of interest policies. Tech. Rep. BBKCS-00-07, Birkbeck College, University of London, 2000.
-
(2000)
-
-
Crampton, J.1
Loizou, G.2
-
8
-
-
0032218233
-
History-based access control for mobile code
-
Edjlali, G., Acharya, A., and Chaudhary, V. History-based access control for mobile code. In Proceedings of Fifth ACM Conference on Computer and Communications Security (1998), pp. 38-48.
-
(1998)
Proceedings of Fifth ACM Conference on Computer and Communications Security
, pp. 38-48
-
-
Edjlali, G.1
Acharya, A.2
Chaudhary, V.3
-
9
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, D., and Chandramouli, R. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security 4, 3 (2001), 224-274.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.4
Chandramouli, R.5
-
10
-
-
0031611731
-
Formal specification for role based access control user/role and role/role relationship management
-
Gavrila, S., and Barkley, J. Formal specification for role based access control user/role and role/role relationship management. In Proceedings of Third ACM Workshop on Role-Based Access Control (Fairfax, Virginia, 1998), pp. 81-90.
-
Proceedings of Third ACM Workshop on Role-Based Access Control (Fairfax, Virginia, 1998)
, pp. 81-90
-
-
Gavrila, S.1
Barkley, J.2
-
11
-
-
0031682433
-
On the formal definition of separation-of-duty policies and their composition
-
Gligor, V., Gavrila, S., and Ferraiolo, D. On the formal definition of separation-of-duty policies and their composition. In Proceedings of 1998 IEEE Symposium on Research in Security and Privacy (Oakland, California, 1998), pp. 172-183.
-
Proceedings of 1998 IEEE Symposium on Research in Security and Privacy (Oakland, California, 1998)
, pp. 172-183
-
-
Gligor, V.1
Gavrila, S.2
Ferraiolo, D.3
-
12
-
-
85006937063
-
Practical safety in flexible access control models
-
Jaeger, T., and Tidswell, J. Practical safety in flexible access control models. ACM Transactions on Information and System Security 4, 2 (2001), 158-190.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.2
, pp. 158-190
-
-
Jaeger, T.1
Tidswell, J.2
-
13
-
-
0001940210
-
The role graph model and conflict of interest
-
Nyanchama, M., and Osborn, S. The role graph model and conflict of interest. ACM Transactions on Information and System Security 2, 1 (1999), 3-33.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 3-33
-
-
Nyanchama, M.1
Osborn, S.2
-
15
-
-
0030086382
-
Role-based access control models
-
Sandhu, R., Coyne, E., Feinstein, H., and Youman, C. Role-based access control models. IEEE Computer 29, 2 (1996), 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
16
-
-
0030644642
-
Separation of duty in role-based environments
-
Simon, R., and Zurko, M. Separation of duty in role-based environments. In Proceedings of 10th IEEE Computer Security Foundations Workshop (Rockport, Massachusetts, 1997), pp. 183-194.
-
Proceedings of 10th IEEE Computer Security Foundations Workshop (Rockport, Massachusetts, 1997)
, pp. 183-194
-
-
Simon, R.1
Zurko, M.2
|