-
1
-
-
77952407814
-
Organization based access control
-
[Abou El Kalam et al., 2003]. IEEE Computer Society Press
-
[Abou El Kalam et al., 2003] Abou El Kalam, A., El Baida, R., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miège, A., Saurel, C., Trouessin, G.: Organization based access control. In: IEEE 4th International Workshop on Policies for Distributed Systems and Networks. IEEE Computer Society Press (2003).
-
(2003)
IEEE 4th International Workshop on Policies for Distributed Systems and Networks
-
-
Abou El Kalam, A.1
El Baida, R.2
Balbiani, P.3
Benferhat, S.4
Cuppens, F.5
Deswarte, Y.6
Miège, A.7
Saurel, C.8
Trouessin, G.9
-
3
-
-
33748865555
-
-
[Balbiani et al., to appear]. To appear
-
[Balbiani et al., to appear] Balbiani, P., Harb, F., Kaafarani, A.: Access control with prohibitions and obligations. To appear.
-
Access Control with Prohibitions and Obligations
-
-
Balbiani, P.1
Harb, F.2
Kaafarani, A.3
-
6
-
-
0018444418
-
Secure databases: Protection against user inference
-
[Dobkin et al., 1979]
-
[Dobkin et al., 1979] Dobkin, D., Jones, A., Lipton, R.: Secure databases: protection against user inference. ACM Transactions on Database Systems 4 (1979) 97-106.
-
(1979)
ACM Transactions on Database Systems
, vol.4
, pp. 97-106
-
-
Dobkin, D.1
Jones, A.2
Lipton, R.3
-
7
-
-
0002422823
-
A role-based access control model and reference implementation within a corporate intranet
-
[Ferraiolo et al., 1999]
-
[Ferraiolo et al., 1999] Ferraiolo, D., Barkley, J., Kuhn, D.: A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Information And System Security 2 (1999) 34-64.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, pp. 34-64
-
-
Ferraiolo, D.1
Barkley, J.2
Kuhn, D.3
-
8
-
-
0141911037
-
-
[Ferraiolo et al., 2003]. Artech House
-
[Ferraiolo et al., 2003] Ferraiolo, D., Kuhn, D., Chandramouli, R.: Role-Based Access Control. Artech House (2003).
-
(2003)
Role-based Access Control
-
-
Ferraiolo, D.1
Kuhn, D.2
Chandramouli, R.3
-
9
-
-
84992227458
-
Proposed NIST Standard for role-based access control
-
[Ferraiolo et al., 2001]
-
[Ferraiolo et al., 2001] Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, D., Chandramouli, R.: Proposed NIST Standard for role-based access control. ACM Transactions on Information And System Security 4 (2001) 224-274.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, pp. 224-274
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.4
Chandramouli, R.5
-
10
-
-
0021937866
-
Theoretical issues concerning protection in operating systems
-
[Harrison, 1985]
-
[Harrison, 1985] Harrison, M.: Theoretical issues concerning protection in operating systems. Advances in Computers 24 (1985) 61-100.
-
(1985)
Advances in Computers
, vol.24
, pp. 61-100
-
-
Harrison, M.1
-
11
-
-
0009442659
-
Monotonic protection systems
-
[Harrison and Ruzzo, 1978]. DeMillo, R., Dobkin, D., Jones, A., Lipton, R. (Editors). Academic Press
-
[Harrison and Ruzzo, 1978] Harrison, M., Ruzzo, W.: Monotonic protection systems. In DeMillo, R., Dobkin, D., Jones, A., Lipton, R. (Editors): Foundations of Secure Computation. Academic Press (1978) 337-363.
-
(1978)
Foundations of Secure Computation
, pp. 337-363
-
-
Harrison, M.1
Ruzzo, W.2
-
12
-
-
0016984825
-
Protection in operating systems
-
[Harrison et al., 1976]
-
[Harrison et al., 1976] Harrison, M., Ruzzo, W., Ullman, J.: Protection in operating systems. Communications of the ACM 19 (1976) 461-471.
-
(1976)
Communications of the ACM
, vol.19
, pp. 461-471
-
-
Harrison, M.1
Ruzzo, W.2
Ullman, J.3
-
13
-
-
0003103622
-
Protection
-
[Lampson, 1974]
-
[Lampson, 1974] Lampson, B.: Protection. Operating Systems Review 8 (1974) 18-24.
-
(1974)
Operating Systems Review
, vol.8
, pp. 18-24
-
-
Lampson, B.1
-
14
-
-
26044478785
-
-
[Pieprzyk et al., 2003]. Springer-Verlag
-
[Pieprzyk et al., 2003] Pieprzyk, J., Hardjono, T., Seberry, J.: Fundamentals of Computer Security. Springer-Verlag (2003).
-
(2003)
Fundamentals of Computer Security
-
-
Pieprzyk, J.1
Hardjono, T.2
Seberry, J.3
-
15
-
-
0030086382
-
Role-based access control models
-
[Sandhu et al., 1996]
-
[Sandhu et al., 1996] Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. Computer 29 (1996) 38-47.
-
(1996)
Computer
, vol.29
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
16
-
-
84872002221
-
On testing for the absence of rights in access control models
-
[Sandhu and Ganta, 1993]. IEEE Computer Society Press
-
[Sandhu and Ganta, 1993] Sandhu, R., Ganta, S: On testing for the absence of rights in access control models. In: IEEE 6th Computer Security Foundations Workshop. IEEE Computer Society Press (1993).
-
(1993)
IEEE 6th Computer Security Foundations Workshop
-
-
Sandhu, R.1
Ganta, S.2
|