메뉴 건너뛰기




Volumn , Issue , 2004, Pages 405-415

Rule-Based RBAC with negative authorization

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL MODEL; NEGATIVE AUTHORIZATION; ROLE-BASED ACCESS CONTROL (RBAC);

EID: 21644481193     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2004.32     Document Type: Conference Paper
Times cited : (44)

References (17)
  • 4
    • 0002422823 scopus 로고    scopus 로고
    • A role based access control model and reference implementation within a corporate intranet
    • February
    • D. Ferraiolo, J. Barkley, and R. Kuhn, "A Role Based Access Control Model and Reference Implementation Within a Corporate Intranet", ACM Transactions on Information and Systems Security, 2(1):34-64, February 1999.
    • (1999) ACM Transactions on Information and Systems Security , vol.2 , Issue.1 , pp. 34-64
    • Ferraiolo, D.1    Barkley, J.2    Kuhn, R.3
  • 7
    • 0242456743 scopus 로고    scopus 로고
    • An administration concept for the enterprise role-based access control model
    • June 1-4, Como, Italy
    • A. Kern, A. Schaad and J. Moffett, "An Administration Concept for the Enterprise Role-Based Access Control Model", SACMAT'03, June 1-4, Como, Italy.
    • SACMAT'03
    • Kern, A.1    Schaad, A.2    Moffett, J.3
  • 8
    • 21644458608 scopus 로고    scopus 로고
    • Role-based access control features in commercial database management systems
    • C. Ramaswamy and R. Sandhu, "Role-Based Access Control Features in Commercial Database Management Systems", NISSC 1998.
    • NISSC 1998
    • Ramaswamy, C.1    Sandhu, R.2
  • 9
    • 84948985429 scopus 로고    scopus 로고
    • Advanced features for enterprise-wide role-based access control
    • Las Vegas, Nevada, USA, December
    • A. Kern, "Advanced Features for Enterprise-Wide Role-Based Access Control", In Proceedings of the 18th Annual Computer Security Applications Conference, Las Vegas, Nevada, USA, December, 2002, pages 333-342.
    • (2002) Proceedings of the 18th Annual Computer Security Applications Conference , pp. 333-342
    • Kern, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.