메뉴 건너뛰기




Volumn 6, Issue 2, 2003, Pages 201-231

Administrative scope: A foundation for role-based administrative models

Author keywords

Administrative scope; Encapsulated range; Role hierarchy operation; Role based access control; Role based administration

Indexed keywords

ADMINISTRATIVE SCOPE; ENCAPSULATED RANGE; ROLE HIERARCHY OPERATION; ROLE-BASED ACCESS CONTROL; ROLE-BASED ADMINISTRATION;

EID: 3142510989     PISSN: 10949224     EISSN: None     Source Type: Journal    
DOI: 10.1145/762476.762478     Document Type: Article
Times cited : (110)

References (23)
  • 1
    • 84956993736 scopus 로고    scopus 로고
    • Role-based authorization constraints specification
    • AHN, G.-J. AND SANDHU, R. 2000. Role-based authorization constraints specification. ACM Trans. Inf. Syst. Sec. 3, 4, 207-226.
    • (2000) ACM Trans. Inf. Syst. Sec. , vol.3 , Issue.4 , pp. 207-226
    • Ahn, G.-J.1    Sandhu, R.2
  • 2
    • 0031368811 scopus 로고    scopus 로고
    • Comparing simple role-based access control models and access control lists
    • Fairfax, VA
    • BARKLEY, J. 1997. Comparing simple role-based access control models and access control lists. In Proceedings of Second ACM Workshop on Role-Based Access Control (Fairfax, VA), 127-132.
    • (1997) Proceedings of Second ACM Workshop on Role-based Access Control , pp. 127-132
    • Barkley, J.1
  • 3
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations
    • Mitre Corporation, Bedford, MA
    • BELL, D. AND LAPADULA, L. 1973. Secure computer systems: mathematical foundations. Tech. Rep. MTR-2547, vol. I, Mitre Corporation, Bedford, MA.
    • (1973) Tech. Rep. , vol.1 MTR-2547
    • Bell, D.1    Lapadula, L.2
  • 4
    • 3142653715 scopus 로고    scopus 로고
    • Ph.D. thesis, Birkbeck College, Univ. of London, UK
    • CRAMPTON, J. 2002. Authorizations and antichains. Ph.D. thesis, Birkbeck College, Univ. of London, UK. Available at http://www.isg.rhul.ac.uk/~umai001/ Pubs/thesis.pdf.
    • (2002) Authorizations and Antichains
    • Crampton, J.1
  • 6
    • 0031368810 scopus 로고    scopus 로고
    • Support for discretionary role-based access control in ACL-oriented operating systems
    • Fairfax, VA
    • FRIBERG, C. AND HELD, A. 1997. Support for discretionary role-based access control in ACL-oriented operating systems. In Proceedings of Second ACM Workshop on Role-Based Access Control (Fairfax, VA), 83-93.
    • (1997) Proceedings of Second ACM Workshop on Role-based Access Control , pp. 83-93
    • Friberg, C.1    Held, A.2
  • 7
    • 0031611731 scopus 로고    scopus 로고
    • Formal specification for role based access control user/role and role/role relationship management
    • Fairfax, VA
    • GAVRILA, S. AND BARKLEY, J. 1998. Formal specification for role based access control user/role and role/role relationship management. In Proceedings of Third ACM Workshop on Role-Based Access Control (Fairfax, VA), 81-90.
    • (1998) Proceedings of Third ACM Workshop on Role-based Access Control , pp. 81-90
    • Gavrila, S.1    Barkley, J.2
  • 10
    • 0016984825 scopus 로고
    • Protection in operating systems
    • HARRISON, M., RUZZO, W., AND ULLMAN, J. 1976. Protection in operating systems. Commun. ACM 19, 8, 461-471.
    • (1976) Commun. ACM , vol.19 , Issue.8 , pp. 461-471
    • Harrison, M.1    Ruzzo, W.2    Ullman, J.3
  • 12
    • 0035251598 scopus 로고    scopus 로고
    • Digital government security infrastructure design challenges
    • JOSHI, J., GHAFOOR, A., AREF, W., AND SPAFFORD, E. 2001. Digital government security infrastructure design challenges. IEEE Comput. 34, 2, 66-72.
    • (2001) IEEE Comput. , vol.34 , Issue.2 , pp. 66-72
    • Joshi, J.1    Ghafoor, A.2    Aref, W.3    Spafford, E.4
  • 16
    • 0001940210 scopus 로고    scopus 로고
    • The role graph model and conflict of interest
    • NYANCHAMA, M. AND OSBORN, S. 1999. The role graph model and conflict of interest. ACM Trans. Inf. Syst. Sec. 2, 1, 3-33.
    • (1999) ACM Trans. Inf. Syst. Sec. , vol.2 , Issue.1 , pp. 3-33
    • Nyanchama, M.1    Osborn, S.2
  • 17
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • OSBORN, S., SANDHU, R., AND MUNAWER, Q. 2000. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Inf. Syst. Sec. 3, 2, 85-106.
    • (2000) ACM Trans. Inf. Syst. Sec. , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.1    Sandhu, R.2    Munawer, Q.3
  • 19
  • 21


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.