메뉴 건너뛰기




Volumn 1, Issue , 2007, Pages 453-458

Flexible and manageable delegation of authority in RBAC

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; MATHEMATICAL MODELS; NETWORK SECURITY; PROBLEM SOLVING;

EID: 35248837003     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AINAW.2007.187     Document Type: Conference Paper
Times cited : (5)

References (15)
  • 1
    • 35248822896 scopus 로고    scopus 로고
    • Itu-t recommendation x.509 2005, iso/iec 9594-8: 2001, information technology, open systems interconnection, public-key and attribute certificate framework
    • Itu-t recommendation x.509 (2005), iso/iec 9594-8: 2001, information technology, open systems interconnection, public-key and attribute certificate framework.
  • 2
    • 84865788031 scopus 로고    scopus 로고
    • A model of oasis role-based access control and its support for active security
    • J. Bacon, K. Moody, and W. Yao. A model of oasis role-based access control and its support for active security. ACM Transactions on Information and System Security, 5(4):492-540, 2002.
    • (2002) ACM Transactions on Information and System Security , vol.5 , Issue.4 , pp. 492-540
    • Bacon, J.1    Moody, K.2    Yao, W.3
  • 3
    • 35248852684 scopus 로고    scopus 로고
    • E. Barka and R. Sandhu. A role-based delegation model and some extensions. In In Proceedings of the 23th National Information Systems Security Conference (NISSC 2000), Baltimore, USA, 2000.
    • E. Barka and R. Sandhu. A role-based delegation model and some extensions. In In Proceedings of the 23th National Information Systems Security Conference (NISSC 2000), Baltimore, USA, 2000.
  • 11
    • 30644480988 scopus 로고    scopus 로고
    • A fine-grained, controllable, userto-user delegation method in rbac
    • Stockholm, Sweden, ACM
    • J. Wainer and A. Kumar. A fine-grained, controllable, userto-user delegation method in rbac. In SACMAT'05, pages 59-66, Stockholm, Sweden, 2005. ACM.
    • (2005) SACMAT'05 , pp. 59-66
    • Wainer, J.1    Kumar, A.2
  • 13
    • 77952903906 scopus 로고    scopus 로고
    • G. Yin, H.-m. Wang, D.-x. Shi, Y. Jia, and M. Teng. A rule-based framework for role-based constrained delegation. ACM International Conference Proceeding Series, Proceedings of the 3rd international conference on Information security, Shanghai, China, 85:186-191, 2004.
    • G. Yin, H.-m. Wang, D.-x. Shi, Y. Jia, and M. Teng. A rule-based framework for role-based constrained delegation. ACM International Conference Proceeding Series, Proceedings of the 3rd international conference on Information security, Shanghai, China, 85:186-191, 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.