메뉴 건너뛰기




Volumn 3252, Issue , 2004, Pages 343-350

AT-RBAC: An authentication trustworthiness-based RBAC model

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; CHEMICAL ACTIVATION; NETWORK SECURITY; SECURITY OF DATA;

EID: 35048852640     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30207-0_43     Document Type: Article
Times cited : (5)

References (8)
  • 1
    • 35048891688 scopus 로고
    • Making login services independent of authentication technologies
    • V Samar, C Lai. Making login services independent of authentication technologies. Sun Microsystems, 1995, http://java.sun.com/security/jaas/doc/pam. html
    • (1995) Sun Microsystems
    • Samar, V.1    Lai, C.2
  • 6
    • 0036700077 scopus 로고    scopus 로고
    • Role-based authorization constraint with time character
    • Dong GY, Qing SH, Liu KL. Role-based authorization constraint with time character. Journal of Software, 2002,13(8):1521-1527
    • (2002) Journal of Software , vol.13 , Issue.8 , pp. 1521-1527
    • Dong, G.Y.1    Qing, S.H.2    Liu, K.L.3
  • 8
    • 0029425954 scopus 로고    scopus 로고
    • Constraints for role-based access control
    • MD: ACM Press
    • Chen, Fang, Sandhu, R. Constraints for role-based access control. In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996.39-46.
    • (1996) Proceedings of the ACM RBAC Workshop , pp. 39-46
    • Chen1    Fang2    Sandhu, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.