-
1
-
-
84956993736
-
Role-based authorization constraints specification
-
AHN, G.-J. AND SANDHU, R. 2000. Role-based authorization constraints specification. ACM Trans. Inf. Syst. Sec. 3, 4, 207-226.
-
(2000)
ACM Trans. Inf. Syst. Sec.
, vol.3
, Issue.4
, pp. 207-226
-
-
Ahn, G.-J.1
Sandhu, R.2
-
2
-
-
0031368811
-
Comparing simple role-based access control models and access control lists
-
Fairfax, VA
-
BARKLEY, J. 1997. Comparing simple role-based access control models and access control lists. In Proceedings of Second ACM Workshop on Role-Based Access Control (Fairfax, VA), 127-132.
-
(1997)
Proceedings of Second ACM Workshop on Role-based Access Control
, pp. 127-132
-
-
Barkley, J.1
-
3
-
-
0003400251
-
Secure computer systems: Mathematical foundations
-
Mitre Corporation, Bedford, MA
-
BELL, D. AND LAPADULA, L. 1973. Secure computer systems: mathematical foundations. Tech. Rep. MTR-2547, vol. I, Mitre Corporation, Bedford, MA.
-
(1973)
Tech. Rep.
, vol.1 MTR-2547
-
-
Bell, D.1
Lapadula, L.2
-
4
-
-
3142653715
-
-
Ph.D. thesis, Birkbeck College, Univ. of London, UK
-
CRAMPTON, J. 2002. Authorizations and antichains. Ph.D. thesis, Birkbeck College, Univ. of London, UK. Available at http://www.isg.rhul.ac.uk/~umai001/ Pubs/thesis.pdf.
-
(2002)
Authorizations and Antichains
-
-
Crampton, J.1
-
6
-
-
0031368810
-
Support for discretionary role-based access control in ACL-oriented operating systems
-
Fairfax, VA
-
FRIBERG, C. AND HELD, A. 1997. Support for discretionary role-based access control in ACL-oriented operating systems. In Proceedings of Second ACM Workshop on Role-Based Access Control (Fairfax, VA), 83-93.
-
(1997)
Proceedings of Second ACM Workshop on Role-based Access Control
, pp. 83-93
-
-
Friberg, C.1
Held, A.2
-
7
-
-
0031611731
-
Formal specification for role based access control user/role and role/role relationship management
-
Fairfax, VA
-
GAVRILA, S. AND BARKLEY, J. 1998. Formal specification for role based access control user/role and role/role relationship management. In Proceedings of Third ACM Workshop on Role-Based Access Control (Fairfax, VA), 81-90.
-
(1998)
Proceedings of Third ACM Workshop on Role-based Access Control
, pp. 81-90
-
-
Gavrila, S.1
Barkley, J.2
-
10
-
-
0016984825
-
Protection in operating systems
-
HARRISON, M., RUZZO, W., AND ULLMAN, J. 1976. Protection in operating systems. Commun. ACM 19, 8, 461-471.
-
(1976)
Commun. ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.1
Ruzzo, W.2
Ullman, J.3
-
12
-
-
0035251598
-
Digital government security infrastructure design challenges
-
JOSHI, J., GHAFOOR, A., AREF, W., AND SPAFFORD, E. 2001. Digital government security infrastructure design challenges. IEEE Comput. 34, 2, 66-72.
-
(2001)
IEEE Comput.
, vol.34
, Issue.2
, pp. 66-72
-
-
Joshi, J.1
Ghafoor, A.2
Aref, W.3
Spafford, E.4
-
13
-
-
85008430937
-
A graph-based formalism for RBAC
-
KOCH, M., MANCINI, L. V., AND PARISI-PRESICCE, F. 2002. A graph-based formalism for RBAC. ACM Trans. Inf. Syst. Sec. 5, 3, 332-365.
-
(2002)
ACM Trans. Inf. Syst. Sec.
, vol.5
, Issue.3
, pp. 332-365
-
-
Koch, M.1
Mancini, L.V.2
Parisi-Presicce, F.3
-
16
-
-
0001940210
-
The role graph model and conflict of interest
-
NYANCHAMA, M. AND OSBORN, S. 1999. The role graph model and conflict of interest. ACM Trans. Inf. Syst. Sec. 2, 1, 3-33.
-
(1999)
ACM Trans. Inf. Syst. Sec.
, vol.2
, Issue.1
, pp. 3-33
-
-
Nyanchama, M.1
Osborn, S.2
-
17
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
OSBORN, S., SANDHU, R., AND MUNAWER, Q. 2000. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Inf. Syst. Sec. 3, 2, 85-106.
-
(2000)
ACM Trans. Inf. Syst. Sec.
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.1
Sandhu, R.2
Munawer, Q.3
-
18
-
-
3142543301
-
Power and permissions in security systems
-
B. Christianson, B. Crispo, J. Malcolm, and M. Roe, Eds. Cambridge, UK
-
SADIGHT FIROZABADI, B. AND SERGOT, M. 1999. Power and permissions in security systems. In Proceedings of 7th International Workshop on Security Protocols, B. Christianson, B. Crispo, J. Malcolm, and M. Roe, Eds. Cambridge, UK, 48-59.
-
(1999)
Proceedings of 7th International Workshop on Security Protocols
, pp. 48-59
-
-
Sadighi Firozabadi, B.1
Sergot, M.2
-
19
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
SANDHU, R., BHAMIDIPATI, V., AND MUNAWER, Q. 1999. The ARBAC97 model for role-based administration of roles. ACM Trans. Inf. and Syst. Sec. 1, 2, 105-135.
-
(1999)
ACM Trans. Inf. and Syst. Sec.
, vol.1
, Issue.2
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, Q.3
-
20
-
-
0030086382
-
Role-based access control models
-
SANDHU, R., COYNE, E., FEINSTEIN, H., AND YOUMAN, C. 1996. Role-based access control models. IEEE Comput. 29, 2, 38-47.
-
(1996)
IEEE Comput.
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
21
-
-
0033652039
-
The NIST model for role-based access control: Towards a unified standard
-
Phoenix, AZ
-
SANDHU, R., FERRAIOLO, D., AND KUHN, D. 2000. The NIST model for role-based access control: towards a unified standard. In Proceedings of Fifth ACM Workshop on Role-Based Access Control (Phoenix, AZ), 47-63. Available at http://www.acm.org/sigsac/nist.pdf.
-
(2000)
Proceedings of Fifth ACM Workshop on Role-based Access Control
, pp. 47-63
-
-
Sandhu, R.1
Ferraiolo, D.2
Kuhn, D.3
-
23
-
-
0035790651
-
A role-based access control model for supporting active security in OASIS
-
Chantilly, VA
-
YAO, W., BACON, J., AND MOODY, K. 2001. A role-based access control model for supporting active security in OASIS. In Proceedings of Sixth ACM Symposium on Access Control Models and Technologies (Chantilly, VA), 171-181.
-
(2001)
Proceedings of Sixth ACM Symposium on Access Control Models and Technologies
, pp. 171-181
-
-
Yao, W.1
Bacon, J.2
Moody, K.3
|