-
1
-
-
0030086382
-
Role-based access control models
-
Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. IEEE Computer 29 (1996) 38-47
-
(1996)
IEEE Computer
, vol.29
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
2
-
-
84992227458
-
Proposed nist standard for role-based access control
-
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kühn, D.R., Chandramoli, R.: Proposed nist standard for role-based access control. ACM Transactions on Information and System Security (TISSEC) 4 (2001) 224-274
-
(2001)
ACM Transactions on Information and System Security (TISSEC)
, vol.4
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kühn, D.R.4
Chandramoli, R.5
-
4
-
-
85008430937
-
A graph-based formalism for rbac
-
Koch, M., Mancini, L.V., Parisi-Presicce, F.: A graph-based formalism for rbac. ACM Transactions on Information and System Security (TISSEC) 5 (2002) 332-365
-
(2002)
ACM Transactions on Information and System Security (TISSEC)
, vol.5
, pp. 332-365
-
-
Koch, M.1
Mancini, L.V.2
Parisi-Presicce, F.3
-
5
-
-
84974750564
-
Authorization in distributed systems: A new approach
-
Woo, T.Y., Lam, S.S.: Authorization in distributed systems: A new approach. Journal of Computer Security 2 (1993) 107-136
-
(1993)
Journal of Computer Security
, vol.2
, pp. 107-136
-
-
Woo, T.Y.1
Lam, S.S.2
-
6
-
-
0027667638
-
A calculus for access control in distributed systems
-
Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems 15 (1993) 706-734
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
9
-
-
0001619596
-
Flexible; support for multiple access control policies
-
Jajodia, S., Samarati, P., Sapino, M., Subrahmanian, V.S.: Flexible; support for multiple access control policies. ACM Transactions on Database Systems 26 (2001) 214-260
-
(2001)
ACM Transactions on Database Systems
, vol.26
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.3
Subrahmanian, V.S.4
-
10
-
-
84865788031
-
A model of oasis role-based access control and its support for active security
-
Bacon, J., Moody, K., Yao, W.: A model of oasis role-based access control and its support for active security. ACM Transactions on Information and System Security (TISSEC) 5 (2002) 492-540
-
(2002)
ACM Transactions on Information and System Security (TISSEC)
, vol.5
, pp. 492-540
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
11
-
-
0041524664
-
A logical framework for reasoning about access control models
-
Bertino, E., Catania, B., Ferrari, E., Perlasca, P.: A logical framework for reasoning about access control models. ACM Transactions on Information and System Security (TISSEC) 6 (2003) 71-127
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, pp. 71-127
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
13
-
-
0031682433
-
On the formal definition of separation-of-duty policies and their composition
-
Oakland, California
-
Gligor, V.D., Gavrila, S.I., Ferrailolo, D.: On the formal definition of separation-of-duty policies and their composition. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, California (1998) 172-185
-
(1998)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 172-185
-
-
Gligor, V.D.1
Gavrila, S.I.2
Ferrailolo, D.3
-
16
-
-
0003727420
-
-
Cambridge University Press
-
Baader, F., McGuinness, D.L., Nardi, D., Patel-Schneider, P.F.: The Description Logic Handbook: Theory, Implementation and Applications. Cambridge University Press (2002)
-
(2002)
The Description Logic Handbook: Theory, Implementation and Applications
-
-
Baader, F.1
McGuinness, D.L.2
Nardi, D.3
Patel-Schneider, P.F.4
|