메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 228-236

Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy

Author keywords

Hierarchy; Multidomain; Role based access control; Role mapping; Secure interoperation

Indexed keywords

CONSTRAINT THEORY; DATA STRUCTURES; LARGE SCALE SYSTEMS; PUBLIC POLICY; QUERY LANGUAGES; SECURITY OF DATA;

EID: 33748076789     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1133058.1133090     Document Type: Conference Paper
Times cited : (61)

References (20)
  • 9
    • 0016349356 scopus 로고
    • Approximation algorithms for combinatorial problems
    • Johnson, D.S., Approximation algorithms for combinatorial problems. J. Comput. System Sci. 9, 1974. 256-278.
    • (1974) J. Comput. System Sci. , vol.9 , pp. 256-278
    • Johnson, D.S.1
  • 14
    • 24344502331 scopus 로고    scopus 로고
    • An analysis of expressiveness and design issues for the generalized temporal role-based access control model
    • April
    • Joshi, J.B.D., Bertino, E., Ghafoor, A. An Analysis of Expressiveness and Design Issues for the Generalized Temporal Role-Based Access Control Model, IEEE Transactions on Dependable and Secure Computing, Vol. 2, No. 2, April 2005.
    • (2005) IEEE Transactions on Dependable and Secure Computing , vol.2 , Issue.2
    • Joshi, J.B.D.1    Bertino, E.2    Ghafoor, A.3
  • 15
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • Osborn, S., Sandhu, R., Munawer, Q. Configuring Role-based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Transactions on Information and System Security, 3(2), 2000, 85-106.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.1    Sandhu, R.2    Munawer, Q.3
  • 17
    • 50249183308 scopus 로고    scopus 로고
    • Role hierarchies and constraints for lattice-based access controls
    • Computer Security - Esorics'96
    • Sandhu, R. Role hierarchies and constraints for lattice-based access controls. Computer Security - Esorics'96, LNCS N. 1146, 1996, 65-79.
    • (1996) LNCS , Issue.1146 , pp. 65-79
    • Sandhu, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.