-
1
-
-
0030086382
-
Role-Based Access Control Models
-
Feb
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-Based Access Control Models. IEEE Computer, 29(2):38-47, Feb. 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
2
-
-
0001853125
-
The Computer for the 21st Century
-
Weiser M. The Computer for the 21st Century. Scientific American, 1991, 265 (3) : 94-104.
-
(1991)
Scientific American
, vol.265
, Issue.3
, pp. 94-104
-
-
Weiser, M.1
-
3
-
-
84948950552
-
-
M. Al-Kahtani and R. Sandhu. A Model for AttributeBased User-Role Assignment. In Proceedings of the 18th Annual Computer Security Applications Conference, Las Vegas, Nevada, USA, pages 353-362, December 2002.
-
M. Al-Kahtani and R. Sandhu. A Model for AttributeBased User-Role Assignment. In Proceedings of the 18th Annual Computer Security Applications Conference, Las Vegas, Nevada, USA, pages 353-362, December 2002.
-
-
-
-
5
-
-
30644464563
-
Rule Support for Role-Based Access Control
-
June
-
A. Kern, C. Walhom. Rule Support for Role-Based Access Control. SACMAT'05, June, 2005.
-
(2005)
SACMAT'05
-
-
Kern, A.1
Walhom, C.2
-
7
-
-
0035791053
-
Securing Context-Aware Applications Using Environment Roles
-
Chantilly, Virginia, USA, May
-
M. Covington, W. Long, S. Srinivasan, D. Dey, M. Ahamad, A. Abowd. "Securing Context-Aware Applications Using Environment Roles" In Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT '01), Chantilly, Virginia, USA, May 2001.
-
(2001)
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT '01)
-
-
Covington, M.1
Long, W.2
Srinivasan, S.3
Dey, D.4
Ahamad, M.5
Abowd, A.6
-
8
-
-
2942618626
-
-
A. Tripathi, T. Ahmed, D. Kulkarni, R. Kumar, K. Kashiramka. Context-Based Secure Resource Access in Pervasive Computing Environments. Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW04). IEEE 2004.
-
A. Tripathi, T. Ahmed, D. Kulkarni, R. Kumar, K. Kashiramka. Context-Based Secure Resource Access in Pervasive Computing Environments. Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW04). IEEE 2004.
-
-
-
-
9
-
-
4444246080
-
Integrated Approach to Engineer and Enforce Context Constraints in RBAC Environments
-
August
-
M. Strembeck, G. Neumanna. Integrated Approach to Engineer and Enforce Context Constraints in RBAC Environments. ACM Transactions on Information and System Security, Vol. 7, No. 3, August 2004
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.3
-
-
Strembeck, M.1
Neumanna, G.2
-
10
-
-
38649120951
-
-
A. Held, S. Buchholz, A. Schill. Modeling of Context Information for Pervasive Computing Applications. Proc. of the 6th World Multiconference on Systemics, Cybernetics and Informatics (SCI2002).
-
A. Held, S. Buchholz, A. Schill. Modeling of Context Information for Pervasive Computing Applications. Proc. of the 6th World Multiconference on Systemics, Cybernetics and Informatics (SCI2002).
-
-
-
-
12
-
-
38649117693
-
-
http://www.ilog.com.
-
-
-
|