메뉴 건너뛰기




Volumn 9, Issue 2, 2006, Pages 113-137

An effective role administration model using organization structure

Author keywords

Access control; RBAC; Role administration; Role based access control

Indexed keywords

ROLE-BASED ACCESS CONTROL (RBAC);

EID: 33748319570     PISSN: 10949224     EISSN: 10949224     Source Type: Journal    
DOI: 10.1145/1151414.1151415     Document Type: Article
Times cited : (57)

References (20)
  • 1
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • Bedford, MA. (Also available through Nat'l Technical Information Service, Spring-field, Va., Report No. NTIS AD-A039324.)
    • BIBA, K. J. 1977. Integrity Considerations for Secure Computer Systems. Mitre Corp. Report No.TR3153, Bedford, MA. (Also available through Nat'l Technical Information Service, Spring-field, Va., Report No. NTIS AD-A039324.)
    • (1977) Mitre Corp. Report No.TR3153 , vol.TR3153
    • Biba, K.J.1
  • 2
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations and model
    • Bedford, MA. (Also available through Nat'l Technical Information Service, Springfield, VA, Report No. NTIS AD-771543.)
    • BELL, D.E. AND LAPADULA, L. J. 1975. Secure Computer Systems: Mathematical Foundations and Model. Mitre Corp. Report No. M74-244, Bedford, MA. (Also available through Nat'l Technical Information Service, Springfield, VA, Report No. NTIS AD-771543.)
    • (1975) Mitre Corp. Report No. M74-244 , vol.M74-244
    • Bell, D.E.1    Lapadula, L.J.2
  • 4
    • 84859274399 scopus 로고    scopus 로고
    • IDS SHARE. Aris house. http:/ /www.ids-scheer.com
  • 9
    • 0035520504 scopus 로고    scopus 로고
    • An improved administration method on role-based access control in the enterprise environment
    • OH, S. AND PARK, S. 2001. An improved administration method on role-based access control in the enterprise environment. Journal of Information Science and Engineering 17, 921-944.
    • (2001) Journal of Information Science and Engineering , vol.17 , pp. 921-944
    • Oh, S.1    Park, S.2
  • 11
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • OSBORN, S., SANDHU, R., AND MUNAWER, Q. 2000. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security, 3, 2, 85-106.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.1    Sandhu, R.2    Munawer, Q.3
  • 13
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • SANDHU, R. 1993. Lattice-Based Access Control Models. IEEE Computer, 26, 11.
    • (1993) IEEE Computer , vol.26 , pp. 11
    • Sandhu, R.1
  • 18
    • 0033312487 scopus 로고    scopus 로고
    • Role-based administration of user-role assignment: The URA97 model and its Oracle implementation
    • SANDHU, R. AND BHAMIDIPATI, V. 1999. Role-based administration of user-role assignment: The URA97 model and its Oracle implementation. Journal of Computer Security, 7.
    • (1999) Journal of Computer Security , vol.7
    • Sandhu, R.1    Bhamidipati, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.