메뉴 건너뛰기




Volumn 38, Issue 4, 2004, Pages 408-413

Practical way to implement role-based access control in security administration system

Author keywords

Access control; Role; Security administration; Security model

Indexed keywords

COMPUTER NETWORKS;

EID: 3142647255     PISSN: 1008973X     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (7)

References (12)
  • 4
    • 3142514899 scopus 로고    scopus 로고
    • The research and development of access control technology
    • ZI Xiao-chao, ZHANG Shao-lian, MAO Bing, et al. The research and development of access control technology [J]. Computer Science, 2001, 28(7): 26-28.
    • (2001) Computer Science , vol.28 , Issue.7 , pp. 26-28
    • Zi, X.-C.1    Zhang, S.-L.2    Mao, B.3
  • 10
    • 0034217105 scopus 로고    scopus 로고
    • A role-based access control model for CSCW systems
    • LI Chen-kai, ZHAN Yong-zhao, MAO Bing. A role-based access control model for CSCW systems [J]. Journal of Software, 2000, 11(7): 931-937.
    • (2000) Journal of Software , vol.11 , Issue.7 , pp. 931-937
    • Li, C.-K.1    Zhan, Y.-Z.2    Mao, B.3
  • 11
    • 3142552980 scopus 로고    scopus 로고
    • A new role-based access control model and it's implement mechanism
    • QIAO Ying, XU De, DAI Guo-zhong. A new role-based access control model and it's implement mechanism [J]. Journal of Computer Research and Development, 2000, 37(1): 37-44.
    • (2000) Journal of Computer Research and Development , vol.37 , Issue.1 , pp. 37-44
    • Qiao, Y.1    Xu, D.2    Dai, G.-Z.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.