-
1
-
-
0002422823
-
A role-based access control model and reference implementation within a corporate intranet
-
February
-
D. F. Ferraiolo, J. F. Barkley, and D. R. Kuhn. A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Information and System Security, 2(1):34-64, February 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 34-64
-
-
Ferraiolo, D.F.1
Barkley, J.F.2
Kuhn, D.R.3
-
2
-
-
84944044679
-
Model-based tool-assistance for packet-filter design
-
E. Lupu M. Sloman, J. Lobo, editor, number 1995 in Lecture Notes in Computer Science, Heidelberg, Springer Verlag
-
I. Lück, C. Schäfer, and H. Krumm. Model-based tool-assistance for packet-filter design. In E. Lupu M. Sloman, J. Lobo, editor, Proc. IEEE Workshop Policy 2001: Policies for Distributed Systems and Networks, number 1995 in Lecture Notes in Computer Science, pages 120-136, Heidelberg, 2001. Springer Verlag.
-
(2001)
Proc. IEEE Workshop Policy 2001: Policies for Distributed Systems and Networks
, pp. 120-136
-
-
Lück, I.1
Schäfer, C.2
Krumm, H.3
-
3
-
-
0037710727
-
Model-based configuration of VPNs
-
R. Stadtler and M. Ulema, editors, Florence, Italy, IEEE
-
I. Lück, S. Vögel, and H. Krumm. Model-based configuration of VPNs. In R. Stadtler and M. Ulema, editors, Proc. 8th IEEE/IFIP Network Operations and Management Symposium NOMS 2002, pages 589-602, Florence, Italy, 2002. IEEE.
-
(2002)
Proc. 8th IEEE/IFIP Network Operations and Management Symposium NOMS 2002
, pp. 589-602
-
-
Lück, I.1
Vögel, S.2
Krumm, H.3
-
5
-
-
33745001247
-
-
Master's thesis, University of Dortmund, Germany, in German
-
G. Rothmaier. Model-based security management: Abstract requirements, trusts areas, and configuration of security services. Master's thesis, University of Dortmund, Germany, 2001. in German.
-
(2001)
Model-based Security Management: Abstract Requirements, Trusts Areas, and Configuration of Security Services
-
-
Rothmaier, G.1
-
6
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
7
-
-
0028726831
-
Policy driven management for distributed systems
-
M. Sloman. Policy driven management for distributed systems. Journal of Network and Systems Management, 2(4):333-360, 1994.
-
(1994)
Journal of Network and Systems Management
, vol.2
, Issue.4
, pp. 333-360
-
-
Sloman, M.1
-
9
-
-
0038064758
-
Using a classification of management policies for policy specification and policy transformation
-
Adarshpal S. Sethi, Yves Raynaud, and Fabienne Fure-Vincent, editors, Santa Barbara, CA, Chapman & Hall
-
R. Wies. Using a classification of management policies for policy specification and policy transformation. In Adarshpal S. Sethi, Yves Raynaud, and Fabienne Fure-Vincent, editors, Integrated Network Management IV, volume 4, pages 44-56, Santa Barbara, CA, 1995. Chapman & Hall.
-
(1995)
Integrated Network Management IV
, vol.4
, pp. 44-56
-
-
Wies, R.1
|