-
2
-
-
84956993736
-
-
AHN, G.-J. AND SANDHU, R. S. 2000. Role-based authorization constraints specification. ACM Transactions on Information and System Security 3, 4 (Nov.), 207-226.
-
AHN, G.-J. AND SANDHU, R. S. 2000. Role-based authorization constraints specification. ACM Transactions on Information and System Security 3, 4 (Nov.), 207-226.
-
-
-
-
3
-
-
34249678137
-
-
ANSI. 2004. American national standard for information technology-role based access control. ANSI INCITS 359-2004.
-
ANSI. 2004. American national standard for information technology-role based access control. ANSI INCITS 359-2004.
-
-
-
-
6
-
-
34249668902
-
-
BERTINO, E., FERRARI, E., AND ATLURI, V. 1999. The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security 2, 1 (Feb.), 65-104.
-
BERTINO, E., FERRARI, E., AND ATLURI, V. 1999. The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security 2, 1 (Feb.), 65-104.
-
-
-
-
7
-
-
0034810791
-
Separation of duties for access control enforcement in workflow environments
-
BOTHA, R. AND ELOFF, J. 2001. Separation of duties for access control enforcement in workflow environments. IBM Systems Journal 40, 3, 666-682.
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 666-682
-
-
BOTHA, R.1
ELOFF, J.2
-
8
-
-
0023266943
-
A comparision of commercial and military computer security policies
-
IEEE Computer Society Press, Washington, D.C
-
CLARK, D. D. AND WILSON, D. R. 1987. A comparision of commercial and military computer security policies. In Proceedings of the 1987 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Washington, D.C. 184-194.
-
(1987)
Proceedings of the 1987 IEEE Symposium on Security and Privacy
, pp. 184-194
-
-
CLARK, D.D.1
WILSON, D.R.2
-
12
-
-
34249664654
-
-
DU, D., GU, J., AND PARDALOS, P. M., Eds. 1997. Satisfiability Problem: Theory and Applications. DIMACS Series in Discrete Mathematics and Theoretical Computer Science, 35. AMS Press, Brooklyn, NY.
-
DU, D., GU, J., AND PARDALOS, P. M., Eds. 1997. Satisfiability Problem: Theory and Applications. DIMACS Series in Discrete Mathematics and Theoretical Computer Science, vol. 35. AMS Press, Brooklyn, NY.
-
-
-
-
15
-
-
84992227458
-
-
FEHRAIOLO, D. F., SANDHU, R. S., GAVRILA, S., KUHN, D. R., AND CHANDRAMOULI, R. 2001. Proposed NIST standard for role-based access control. ACM Transactions on Information and Systems Security 4, 3 (Aug.), 224-274.
-
FEHRAIOLO, D. F., SANDHU, R. S., GAVRILA, S., KUHN, D. R., AND CHANDRAMOULI, R. 2001. Proposed NIST standard for role-based access control. ACM Transactions on Information and Systems Security 4, 3 (Aug.), 224-274.
-
-
-
-
17
-
-
0029706405
-
A security model of dynamic labeling providing a tiered approach to verification
-
FOLEY, S., GONG, L., AND QIAN, X. 1996. A security model of dynamic labeling providing a tiered approach to verification. In Proceedings of IEEE Symposium on Research in Security and Privacy, 142-153.
-
(1996)
Proceedings of IEEE Symposium on Research in Security and Privacy
, pp. 142-153
-
-
FOLEY, S.1
GONG, L.2
QIAN, X.3
-
23
-
-
0242456740
-
Dependencies and separation of duty constraints in gtrbac
-
JOSHI, J., BERTINO, E., SHAFIQ, B., AND GHAFOOR, A. 2003. Dependencies and separation of duty constraints in gtrbac. In Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies (SACMAT). 51-64.
-
(2003)
Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 51-64
-
-
JOSHI, J.1
BERTINO, E.2
SHAFIQ, B.3
GHAFOOR, A.4
-
24
-
-
17444406680
-
-
JOSHI, J., BERTINO, E., LATIF, U., AND GHAFOOR, A. 2005. A generalized temporal role-based access control model. IEEE Transactions on Knowledge and Data Engineering (TKDE) 17, 1 (Jan.), 4-23.
-
JOSHI, J., BERTINO, E., LATIF, U., AND GHAFOOR, A. 2005. A generalized temporal role-based access control model. IEEE Transactions on Knowledge and Data Engineering (TKDE) 17, 1 (Jan.), 4-23.
-
-
-
-
25
-
-
30644466528
-
Secure Role-Based Workflow Models
-
Kluwer Academic Publishers, Norwell, MA
-
KANDALA, S. AND SANDHU, R. 2002. Secure Role-Based Workflow Models. In Proceedings of the Fifteenth Annual Working Conference on Database and Application Security, Kluwer Academic Publishers, Norwell, MA. 45-58.
-
(2002)
Proceedings of the Fifteenth Annual Working Conference on Database and Application Security
, pp. 45-58
-
-
KANDALA, S.1
SANDHU, R.2
-
27
-
-
0031346670
-
Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems
-
KUHN, D. R. 1997. Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. In Proceedings of the Second ACM Workshop on Role-Based Access Control (RBAC'97). 23-30.
-
(1997)
Proceedings of the Second ACM Workshop on Role-Based Access Control (RBAC'97)
, pp. 23-30
-
-
KUHN, D.R.1
-
28
-
-
14844297758
-
On mutually-exclusive roles and separation of duty
-
ACM Press, New York
-
LI, N., BIZRI, Z., AND TRIPUNITARA, M. V. 2004. On mutually-exclusive roles and separation of duty. In Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS-11). ACM Press, New York. 42-51.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS-11)
, pp. 42-51
-
-
LI, N.1
BIZRI, Z.2
TRIPUNITARA, M.V.3
-
31
-
-
0016555241
-
-
SALTZER, J. H. AND SCHROEDER, M. D. 1975. The protection of information in computer systems. Proceedings of the IEEE 63, 9 (Sept.), 1278-1308.
-
SALTZER, J. H. AND SCHROEDER, M. D. 1975. The protection of information in computer systems. Proceedings of the IEEE 63, 9 (Sept.), 1278-1308.
-
-
-
-
35
-
-
0030086382
-
-
SANDHU, R. S., COYNE, E. J., FEINSTEIN, H. L., AND YOUMAN, C. E. 1996. Role-based access control models. IEEE Computer 29, 2 (Feb.), 38-47.
-
SANDHU, R. S., COYNE, E. J., FEINSTEIN, H. L., AND YOUMAN, C. E. 1996. Role-based access control models. IEEE Computer 29, 2 (Feb.), 38-47.
-
-
-
-
36
-
-
0035790675
-
The role-based access control system of a European bank: A case study and discussion
-
ACM Press, New York
-
SCHAAD, A., MOFFETT, J., AND JACOB, J. 2001. The role-based access control system of a European bank: A case study and discussion. In Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies. ACM Press, New York. 3-9.
-
(2001)
Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies
, pp. 3-9
-
-
SCHAAD, A.1
MOFFETT, J.2
JACOB, J.3
|