메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 81-90

Fine-grained role-based delegation in presence of the hybrid role hierarchy

Author keywords

Access control; Delegation; Hybrid hierarchy; Role based

Indexed keywords

HIERARCHICAL SYSTEMS; INFORMATION RETRIEVAL; SECURITY OF DATA; SEMANTICS;

EID: 33748044645     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1133058.1133071     Document Type: Conference Paper
Times cited : (34)

References (27)
  • 9
    • 0035251598 scopus 로고    scopus 로고
    • Digital government security infrastructure design challenges
    • [Jos01a], February
    • [Jos01a] J. B. D. Joshi, A. Ghafoor, W. Aref, E. H. Spafford. Digital Government Security Infrastructure Design Challenges. IEEE Computer, Vol. 34, No. 2, February 2001, pages 66-72.
    • (2001) IEEE Computer , vol.34 , Issue.2 , pp. 66-72
    • Joshi, J.B.D.1    Ghafoor, A.2    Aref, W.3    Spafford, E.H.4
  • 17
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • [Osb00], May
    • [Osb00] S. Osborn, R. Sandhu, Q. Munawer. Configuring Role-based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Transactions on Information and System Security, 3(2):85-106, May 2000.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.1    Sandhu, R.2    Munawer, Q.3
  • 18
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • [San96a], IEEE Press
    • [San96a] R. Sandhu, E. J. Coyne, H. L. Feinstein, C. E. Youman. Role-Based Access Control Models. IEEE Computer 29(2): 38-47, IEEE Press, 1996
    • (1996) IEEE Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1    Coyne, E.J.2    Feinstein, H.L.3    Youman, C.E.4
  • 19
    • 50249183308 scopus 로고    scopus 로고
    • Role hierarchies and constraints for lattice-based access controls
    • [San96b] E. Bertino, H. Kurth, G. Martella, and E. Montolivo Eds., LNCS N. 1146, Rome, Italy
    • [San96b] R. Sandhu. Role Hierarchies and Constraints for Lattice-based Access Controls. In E. Bertino, H. Kurth, G. Martella, and E. Montolivo Eds., Computer Security - Esorics'96, LNCS N. 1146, Rome, Italy, 1996, pages 65-79.
    • (1996) Computer Security - Esorics'96 , pp. 65-79
    • Sandhu, R.1
  • 24
    • 0031387996 scopus 로고    scopus 로고
    • Team Based Access Control (TBAC): A primitive for applying role-based access controls in collaborative environments
    • [Tho97], Nov
    • [Tho97] R. K. Thomas. Team Based Access Control (TBAC): A Primitive for Applying Role-based Access Controls in Collaborative Environments. ACM Proceedings of the second ACM workshop on Role-based access control Fairfax., Nov, 1997.
    • (1997) ACM Proceedings of the Second ACM Workshop on Role-based Access Control Fairfax
    • Thomas, R.K.1
  • 26
    • 0242540371 scopus 로고    scopus 로고
    • PBDM: A flexible delegation model in RBAC
    • [Zha03a]
    • [Zha03a] X. Zhang, S. Oh and R. Sandhu, PBDM: A Flexible Delegation Model in RBAC, SACMAT 2003.
    • SACMAT 2003
    • Zhang, X.1    Oh, S.2    Sandhu, R.3
  • 27


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.