-
4
-
-
33749069296
-
-
(NCSC-TG-004), October 21
-
National Computer Security Center (NCSC), "Glossary of Computer Security Terms" (NCSC-TG-004), October 21, 1988, http://csrc.nist.gov/ secpubs/rainbow/tg004.txt
-
(1988)
Glossary of Computer Security Terms
-
-
-
5
-
-
0003400251
-
Secure computer systems: Mathematical foundations and model
-
Bedford, MA
-
D.E. Bell and L.J. LaPadula, "Secure Computer Systems: Mathematical Foundations and Model", Mitre Corp. Report No. M74-244, Bedford, MA, 1975
-
(1975)
Mitre Corp. Report No. M74-244
, vol.M74-244
-
-
Bell, D.E.1
LaPadula, L.J.2
-
7
-
-
0027699087
-
Lattice-based access control models
-
November
-
Ravi S. Sandhu, "Lattice-Based Access Control Models", IEEE Computer, November 1993, pp. 9-19
-
(1993)
IEEE Computer
, pp. 9-19
-
-
Sandhu, R.S.1
-
8
-
-
0030086382
-
Role-based access control models
-
February
-
Ravi S. Sandhu et al., "Role-Based Access Control Models", IEEE Computer, February 1996, pp. 38-47
-
(1996)
IEEE Computer
, pp. 38-47
-
-
Sandhu, R.S.1
-
10
-
-
0242456733
-
Induced role hierarchies with attribute-based RBAC
-
ACM Press, Como, Italy
-
Mohammad A. Al-Kahtani and Ravi Sandhu, "Induced role hierarchies with attribute-based RBAC", SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies, ACM Press, Como, Italy, 2003, pp. 142-148
-
(2003)
SACMAT '03: Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies
, pp. 142-148
-
-
Al-Kahtani, M.A.1
Sandhu, R.2
-
11
-
-
0347380552
-
Supporting relationships in access control using role based access control
-
ACM Press
-
J. F. Barkley, K. Beznosov, and J. Uppal, "Supporting Relationships in Access Control Using Role Based Access Control", ACM Workshop on Role-Based Access Control, ACM Press, 1999, pp. 55-65
-
(1999)
ACM Workshop on Role-Based Access Control
, pp. 55-65
-
-
Barkley, J.F.1
Beznosov, K.2
Uppal, J.3
-
12
-
-
0031639452
-
Authorization and attribute certificates for widely distributed access control
-
W. Johnston, S. Mudumbai, and M. Thompson, "Authorization and Attribute Certificates for Widely Distributed Access Control", Proceedings of the IEEE 7th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 1998, p. 340
-
(1998)
Proceedings of the IEEE 7th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
, pp. 340
-
-
Johnston, W.1
Mudumbai, S.2
Thompson, M.3
-
13
-
-
85084164318
-
Certificate-based access control for widely distributed resources
-
USENIX Association, Washington D.C.
-
M. Thompson, W. Johnson, S. Mudumbai, G. Hoo, K. Jackson, and A. Essiar, "Certificate-based Access Control for Widely Distributed Resources", Proceedings of 8th USENIX UNIX Security Symposium, USENIX Association, Washington D.C., 1999, pp. 215-227
-
(1999)
Proceedings of 8th USENIX UNIX Security Symposium
, pp. 215-227
-
-
Thompson, M.1
Johnson, W.2
Mudumbai, S.3
Hoo, G.4
Jackson, K.5
Essiar, A.6
|