-
1
-
-
35248892529
-
-
Anne Anderson. OASIS Standard: Core and hierarchical role based access control (RBAC) profile of XACML v2.0, February 2005.
-
Anne Anderson. OASIS Standard: Core and hierarchical role based access control (RBAC) profile of XACML v2.0, February 2005.
-
-
-
-
3
-
-
35248881658
-
-
C.Bettini, S.Jajodia, X.Wang, and D.Wijesekera. Provisions and Obligations in Policy Management and Security Applications. In VLDB, 2002.
-
C.Bettini, S.Jajodia, X.Wang, and D.Wijesekera. Provisions and Obligations in Policy Management and Security Applications. In VLDB, 2002.
-
-
-
-
4
-
-
0037303408
-
The PERMIS X.509 Role Based Privilege Management Infrastructure
-
D.Chadwick and A.Otenko. The PERMIS X.509 Role Based Privilege Management Infrastructure. Future Generation Computer System, 19(2):277-289, 2003.
-
(2003)
Future Generation Computer System
, vol.19
, Issue.2
, pp. 277-289
-
-
Chadwick, D.1
Otenko, A.2
-
5
-
-
2942671893
-
RBAC Policies in XML for X.509 Based Privilege Management
-
May
-
D.W. Chadwick and A. Otenko. RBAC Policies in XML for X.509 Based Privilege Management. In SEC2002. May 2002.
-
(2002)
SEC2002
-
-
Chadwick, D.W.1
Otenko, A.2
-
6
-
-
35248882114
-
-
D.Ferraiolo and R.Kuhn. Role-based Access Control. In Proceedings of 15th National Computer Security Conference, 1992.
-
D.Ferraiolo and R.Kuhn. Role-based Access Control. In Proceedings of 15th National Computer Security Conference, 1992.
-
-
-
-
7
-
-
0031611731
-
Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management
-
S. Gavrila and J. Barkley. Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management. In Third ACM Workshop on Role-Based Access Control, 1998.
-
(1998)
Third ACM Workshop on Role-Based Access Control
-
-
Gavrila, S.1
Barkley, J.2
-
8
-
-
35248884487
-
-
D. Jonscher. Extending access controls with duties - realized by active mechanisms. In Database Security VI: Status and Prospects. 1993.
-
D. Jonscher. Extending access controls with duties - realized by active mechanisms. In Database Security VI: Status and Prospects. 1993.
-
-
-
-
9
-
-
0022334918
-
-
N.H. Minsky and A.D. Lockman. Ensuring integrity by adding obligations to privileges. In ICSE '85, 1985.
-
N.H. Minsky and A.D. Lockman. Ensuring integrity by adding obligations to privileges. In ICSE '85, 1985.
-
-
-
-
10
-
-
35248822319
-
-
OASIS XACML TC. XACML 2.0 Core: extensible Access Control Markup Language (XACML) Version 2.0, Oct, 2005. Available on
-
OASIS XACML TC. XACML 2.0 Core: extensible Access Control Markup Language (XACML) Version 2.0, Oct, 2005. Available on http://www.oasis-open.org/ committees/tc_home.php?wg_abbrev=xacml#XACML20.
-
-
-
-
11
-
-
1642415586
-
Using attribute certificates to implement role-based authorization and access controls
-
R. Oppliger, G. Pernul, and C. Strauss. Using attribute certificates to implement role-based authorization and access controls. SIS 2000, 2000.
-
(2000)
SIS 2000
-
-
Oppliger, R.1
Pernul, G.2
Strauss, C.3
-
14
-
-
0030086382
-
Role-based access control models
-
R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. Role-based access control models. IEEE Computer, 29(2), 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
15
-
-
35248838914
-
-
ANSI INCITS 359-2004. Role Based Access Control. American National Standards Institute, Inc., February 2004.
-
ANSI INCITS 359-2004. Role Based Access Control. American National Standards Institute, Inc., February 2004.
-
-
-
|