-
1
-
-
0003400255
-
Integrity considerations for secure computer systems
-
Bedford, MA. (Also available through Nat'l Technical Information Service, Spring-field, Va., Report No. NTIS AD-A039324.)
-
BIBA, K. J. 1977. Integrity Considerations for Secure Computer Systems. Mitre Corp. Report No.TR3153, Bedford, MA. (Also available through Nat'l Technical Information Service, Spring-field, Va., Report No. NTIS AD-A039324.)
-
(1977)
Mitre Corp. Report No.TR3153
, vol.TR3153
-
-
Biba, K.J.1
-
2
-
-
0003400251
-
Secure computer systems: Mathematical foundations and model
-
Bedford, MA. (Also available through Nat'l Technical Information Service, Springfield, VA, Report No. NTIS AD-771543.)
-
BELL, D.E. AND LAPADULA, L. J. 1975. Secure Computer Systems: Mathematical Foundations and Model. Mitre Corp. Report No. M74-244, Bedford, MA. (Also available through Nat'l Technical Information Service, Springfield, VA, Report No. NTIS AD-771543.)
-
(1975)
Mitre Corp. Report No. M74-244
, vol.M74-244
-
-
Bell, D.E.1
Lapadula, L.J.2
-
4
-
-
84859274399
-
-
IDS SHARE. Aris house. http:/ /www.ids-scheer.com
-
-
-
-
5
-
-
0000206310
-
Security models for web-based applications
-
JOSHI, J. B. D., AREF, W. G., GHAFOOR, A., AND SPAFFORD, E. H. 2001. Security models for web-based applications. Communications of the ACM, 44, 2.
-
(2001)
Communications of the ACM
, vol.44
, pp. 2
-
-
Joshi, J.B.D.1
Aref, W.G.2
Ghafoor, A.3
Spafford, E.H.4
-
8
-
-
0001940210
-
The role graph model and conflict of interest
-
NYANCHAMA, M. AND OSBORN, S. 1999. The role graph model and conflict of interest. ACM Transactions on Information and System Security, 2, 1, 3-33.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 3-33
-
-
Nyanchama, M.1
Osborn, S.2
-
9
-
-
0035520504
-
An improved administration method on role-based access control in the enterprise environment
-
OH, S. AND PARK, S. 2001. An improved administration method on role-based access control in the enterprise environment. Journal of Information Science and Engineering 17, 921-944.
-
(2001)
Journal of Information Science and Engineering
, vol.17
, pp. 921-944
-
-
Oh, S.1
Park, S.2
-
11
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
OSBORN, S., SANDHU, R., AND MUNAWER, Q. 2000. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security, 3, 2, 85-106.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.1
Sandhu, R.2
Munawer, Q.3
-
13
-
-
0027699087
-
Lattice-based access control models
-
SANDHU, R. 1993. Lattice-Based Access Control Models. IEEE Computer, 26, 11.
-
(1993)
IEEE Computer
, vol.26
, pp. 11
-
-
Sandhu, R.1
-
17
-
-
0030086382
-
Role-based access control models
-
SANDHU, R., COYNE, E., FEINSTEIN H., AND YOUMAN, C. 1996. Role-based access control models. IEEE Computer, 29, 2, 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
18
-
-
0033312487
-
Role-based administration of user-role assignment: The URA97 model and its Oracle implementation
-
SANDHU, R. AND BHAMIDIPATI, V. 1999. Role-based administration of user-role assignment: The URA97 model and its Oracle implementation. Journal of Computer Security, 7.
-
(1999)
Journal of Computer Security
, vol.7
-
-
Sandhu, R.1
Bhamidipati, V.2
-
20
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
SANDHU, R., BHAMIDIPATI V., AND MUNAWER, Q. 1999. The ARBAC97 model for role-based administration of roles. ACM Transactions on Information and System Security, 2, 1, 105-135.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, Q.3
|