메뉴 건너뛰기




Volumn , Issue , 2002, Pages 74-83

Temporal hierarchies and inheritance semantics for GTRBAC

Author keywords

Role based access control; Role hierarchy; Security; Temporal constraints

Indexed keywords

CONSTRAINT THEORY; DATA STRUCTURES; DATABASE SYSTEMS; INTERNET; SECURITY OF DATA;

EID: 0242625215     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/507721.507724     Document Type: Conference Paper
Times cited : (82)

References (12)
  • 2
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • September
    • E. Bertino, E. Ferrari, and V. Atluri. The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security, 2(1):65-104, September 1999.
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 5
    • 0010647417 scopus 로고    scopus 로고
    • Generalized temporal role based access control model (GTRBAC) (part I)- Specification and modeling
    • Technical Report CERIAS TR 2001-47, Purdue University
    • J. B. D. Joshi, E. Bertino, U. Latif, and A. Ghafoor. Generalized temporal role based access control model (GTRBAC) (Part I)- specification and modeling. Technical Report CERIAS TR 2001-47, Purdue University, 2001.
    • (2001)
    • Joshi, J.B.D.1    Bertino, E.2    Latif, U.3    Ghafoor, A.4
  • 6
    • 0035251598 scopus 로고    scopus 로고
    • Digital government security infrastructure design challenges
    • February
    • J. B. D. Joshi, A. Ghafoor, W. Aref, and E. H. Spafford. Digital government security infrastructure design challenges. IEEE Computer, 34(2):66-72, February 2001.
    • (2001) IEEE Computer , vol.34 , Issue.2 , pp. 66-72
    • Joshi, J.B.D.1    Ghafoor, A.2    Aref, W.3    Spafford, E.H.4
  • 9
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • May
    • S. Orborn, R. Sandhu, and Q. Munawer. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security, 3(2):85-106, May 2000.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.2 , pp. 85-106
    • Orborn, S.1    Sandhu, R.2    Munawer, Q.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.