-
2
-
-
0020849266
-
Maintaining knowledge about temporal intervals
-
Nov.
-
J.F. Allen, "Maintaining Knowledge about Temporal Intervals," Comm. ACM, vol. 26, no. 11, pp. 832-843, Nov. 1983.
-
(1983)
Comm. ACM
, vol.26
, Issue.11
, pp. 832-843
-
-
Allen, J.F.1
-
3
-
-
0008724838
-
An authorization model for temporal and derived data: Securing information portals
-
Feb.
-
V. Atluri and A. Gal, "An Authorization Model for Temporal and Derived Data: Securing Information Portals," ACM Trans. Information and System Security, vol. 5, no. 1, pp. 62-94, Feb. 2002.
-
(2002)
ACM Trans. Information and System Security
, vol.5
, Issue.1
, pp. 62-94
-
-
Atluri, V.1
Gal, A.2
-
4
-
-
84865788031
-
A model of OASIS role-based access control and its support for active security
-
Nov.
-
J. Bacon, K. Moody, and W. Yao, "A Model of OASIS Role-Based Access Control and Its Support for Active Security," ACM Trans. Information and System Security, vol. 5, no. 4, Nov. 2002.
-
(2002)
ACM Trans. Information and System Security
, vol.5
, Issue.4
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
5
-
-
0032153903
-
An access control model supporting periodicity constraints and temporal reasoning
-
Sept.
-
E. Bertino, C. Bettini, E. Ferrari, and P. Samarati, "An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning," ACM Trans. Database Systems, vol. 23, no. 3, pp. 231-285, Sept. 1998.
-
(1998)
ACM Trans. Database Systems
, vol.23
, Issue.3
, pp. 231-285
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
6
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Feb.
-
E. Bertino, E. Ferrari, and V. Atluri, "The Specification and Enforcement of Authorization Constraints in Workflow Management Systems," ACM Trans. Information and System Security, vol. 2, no. 1, pp. 65-104, Feb. 1999.
-
(1999)
ACM Trans. Information and System Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
7
-
-
84944792110
-
TRBAC: A temporal role-based access control model
-
Aug.
-
E. Bertino, P.A. Bonatti, and E. Ferrari, "TRBAC: A Temporal Role-Based Access Control Model," ACM Trans. Information and System Security, vol. 4, no. 3, pp. 191-233, Aug. 2001.
-
(2001)
ACM Trans. Information and System Security
, vol.4
, Issue.3
, pp. 191-233
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
8
-
-
0002422823
-
A role-based access control model and reference implementation within a corporate intranet
-
D. Ferrariolo, J.F. Barkley, and D.R. Kuhn, A Role-Based Access" Control Model and Reference Implementation within a Corporate Intranet," ACM Trans. Information and System Security, vol. 2, no. 1, pp. 34-64, 1999.
-
(1999)
ACM Trans. Information and System Security
, vol.2
, Issue.1
, pp. 34-64
-
-
Ferrariolo, D.1
Barkley, J.F.2
Kuhn, D.R.3
-
9
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Aug.
-
D.F. Ferraiolo, R. Sandhu, S. Gavrila, D.R. Kuhn, and R. Chandramouli, "Proposed NIST Standard for Role-Based Access Control," ACM Trans. Information and System Security, vol. 4, no. 3, pp. 224-274, Aug. 2001.
-
(2001)
ACM Trans. Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
11
-
-
17444380439
-
Mutual exclusion of roles as a means of implementing separation of duties in a role-based access control system
-
D.R. Kuhn, "Mutual Exclusion of Roles as a Means of Implementing Separation of Duties in a Role-Based Access Control System," ACM Trans. Information and System Security, vol. 2, no. 2, pp. 177-228, 1999.
-
(1999)
ACM Trans. Information and System Security
, vol.2
, Issue.2
, pp. 177-228
-
-
Kuhn, D.R.1
-
13
-
-
0001940210
-
The role graph model and conflict of interest
-
M. Nyanchama and S. Osborn, "The Role Graph Model and Conflict of Interest," ACM Trans. Information and System Security, vol. 2, no. 1, pp. 3-33, 1999.
-
(1999)
ACM Trans. Information and System Security
, vol.2
, Issue.1
, pp. 3-33
-
-
Nyanchama, M.1
Osborn, S.2
-
14
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
Feb.
-
S.L. Osborn, R. Sandhu, and Q. Munawer, "Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies," ACM Trans. Information and System Security, vol. 3, no. 2, Feb. 2000.
-
(2000)
ACM Trans. Information and System Security
, vol.3
, Issue.2
-
-
Osborn, S.L.1
Sandhu, R.2
Munawer, Q.3
-
15
-
-
0347380518
-
Separation of duties in computerized information systems
-
North Holland
-
R. Sandhu, "Separation of Duties in Computerized Information Systems," Database Security IV: Status and Prospects, pp. 179-189, North Holland, 1991.
-
(1991)
Database Security IV: Status and Prospects
, pp. 179-189
-
-
Sandhu, R.1
-
16
-
-
0030086382
-
Role-based access control models
-
Feb.
-
R. Sandhu, E. Coyne, H. Feinstem, and C. Youman, "Role-Based Access Control Models," Computer, vol. 29, no. 2, Feb. 1996.
-
(1996)
Computer
, vol.29
, Issue.2
-
-
Sandhu, R.1
Coyne, E.2
Feinstem, H.3
Youman, C.4
|