-
1
-
-
84948950552
-
A model for attribute-based user-role assignment
-
AKS02
-
[AKS02] M.A. Al-Kahtani and R. Sandhu. A model for attribute-based user-role assignment. In ACSAC 2002, 2002.
-
(2002)
ACSAC 2002
-
-
Al-Kahtani, M.A.1
Sandhu, R.2
-
2
-
-
0242456733
-
Induced role hierarchies with attribute-based rbac
-
AKS03
-
[AKS03] M.A. Al-Kahtani and R. Sandhu. Induced role hierarchies with attribute-based rbac. In Proceedings ACM SACMAT, 2003.
-
(2003)
Proceedings ACM SACMAT
-
-
Al-Kahtani, M.A.1
Sandhu, R.2
-
3
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
+01
-
+01] D.F. Ferraiolo, R. Sandhu, S. Gavrila, D.R. Kuhn, and R. Chandramouli. Proposed NIST standard for role-based access control. ACM TISSEC, 4(3):224-275, 2001.
-
(2001)
ACM TISSEC
, vol.4
, Issue.3
, pp. 224-275
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
4
-
-
0033724294
-
Access control meets public key infrastructure, or: Assigning roles to strangers
-
HMM00 May
-
[HMM00] A Herzberg, Y. Mass, and J. Mihaeli. Access control meets public key infrastructure, or: Assigning roles to strangers. In IEEE Symposium on Security and Privacy, May 2000.
-
(2000)
IEEE Symposium on Security and Privacy
-
-
Herzberg, A.1
Mass, Y.2
Mihaeli, J.3
-
7
-
-
0010573970
-
Access rights administration in role-based security systems
-
NO94 J. Biskup, M. Morgenstern, and C. E. Landwehr, editors, North-Holland
-
[NO94] M. Nyanchama and S. L. Osborn. Access rights administration in role-based security systems. In J. Biskup, M. Morgenstern, and C. E. Landwehr, editors, Database Security, VIII, Status and Prospects WG11.3 Working Conference on Database Security, pages 37-56. North-Holland, 1994.
-
(1994)
Database Security, VIII, Status and Prospects WG11.3 Working Conference on Database Security
, pp. 37-56
-
-
Nyanchama, M.1
Osborn, S.L.2
-
8
-
-
0001940210
-
The role graph model and conflict of interest
-
NO99
-
[NO99] M. Nyanchama and S. L. Osborn. The role graph model and conflict of interest. ACM TISSEC, 2(1):3-33, 1999.
-
(1999)
ACM TISSEC
, vol.2
, Issue.1
, pp. 3-33
-
-
Nyanchama, M.1
Osborn, S.L.2
-
9
-
-
0033651730
-
Modeling users in role-based access control
-
OG00 Berlin, Germany, July
-
[OG00] S. Osborn and Y. Guo. Modeling users in role-based access control. In Fifth ACM Workshop on Role-Based Access Control, pages 31-38, Berlin, Germany, July 2000.
-
(2000)
Fifth ACM Workshop on Role-Based Access Control
, pp. 31-38
-
-
Osborn, S.1
Guo, Y.2
-
10
-
-
0242540380
-
A methodology for managing roles in legacy systems
-
OHL03
-
[OHL03] Sylvia L. Osborn, Yan Han, and Jun Liu. A methodology for managing roles in legacy systems. In Proc. 8th ACM SACMAT, pages 33-40, 2003.
-
(2003)
Proc. 8th ACM SACMAT
, pp. 33-40
-
-
Osborn, S.L.1
Han, Y.2
Liu, J.3
-
11
-
-
0242491000
-
A model of role administration using organization structure
-
OS02
-
[OS02] Sejong Oh and Ravi Sandhu. A model of role administration using organization structure. In Proc. 7th ACM SACMAT, pages 155-162, 2002.
-
(2002)
Proc. 7th ACM SACMAT
, pp. 155-162
-
-
Oh, S.1
Sandhu, R.2
-
12
-
-
0030086382
-
Role-based access control models
-
SCFY96 Feb.
-
[SCFY96] R. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. Role-based access control models. IEEE Computer, 29:38-47, Feb. 1996.
-
(1996)
IEEE Computer
, vol.29
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
|