-
1
-
-
38949188648
-
-
st International Conference on Internet Computing, June 26th - 29th, 2000,Monte Carlo Resort, Las Vegas,Nevada, USA.
-
st International Conference on Internet Computing, June 26th - 29th, 2000,Monte Carlo Resort, Las Vegas,Nevada, USA.
-
-
-
-
2
-
-
84962248491
-
Seraphism:Dynamic interoperable security architecture for active networks
-
Tel-Aviv, March
-
R. Campbell, Z. Liu, D. Mickunas, P. Naldurg, and S. Yi. "Seraphism:Dynamic interoperable security architecture for active networks", IEEE OPENARCH 2000, Tel-Aviv, March 2000.
-
(2000)
IEEE OPENARCH 2000
-
-
Campbell, R.1
Liu, Z.2
Mickunas, D.3
Naldurg, P.4
Yi, S.5
-
3
-
-
38949145730
-
-
Jalal Al-Muhtadi, Apu Kapadia, Roy H. Campbell, and M. Dennis Mickunas. A-IRBAC 2000 Model: Administrative Interoperable Role-Based Access Control. Technical Report UIUC-DCS-R-2000-2163.http://choices.cs. uiuc.edu/~almuhtad/
-
Jalal Al-Muhtadi, Apu Kapadia, Roy H. Campbell, and M. Dennis Mickunas. "A-IRBAC 2000 Model: Administrative Interoperable Role-Based Access Control". Technical Report UIUC-DCS-R-2000-2163.http://choices.cs. uiuc.edu/~almuhtad/
-
-
-
-
4
-
-
38949187197
-
-
Eric Freudenthal,et al. dRBAC:Distributed Role-based Access Control for Dynamic Coalition Environments[EB/OL]. http://www.cs.nyu.edu/vijayk/ papers/drbacicdcs02.pdf,2002-06
-
Eric Freudenthal,et al. "dRBAC:Distributed Role-based Access Control for Dynamic Coalition Environments[EB/OL]". http://www.cs.nyu.edu/vijayk/ papers/drbacicdcs02.pdf,2002-06
-
-
-
-
5
-
-
0030086382
-
-
R. Sandhu, Edward J Coyne, Hal L. Feinstein, et al. Role-Based Access Control Models. IEEE Computer, 1996,29(11), pp 38-47.
-
R. Sandhu, Edward J Coyne, Hal L. Feinstein, et al. "Role-Based Access Control Models". IEEE Computer, 1996,29(11), pp 38-47.
-
-
-
-
6
-
-
0001549660
-
The ARBAC Model for Role-Based Administration of Roles
-
Ravi Sandhu, Venkata Bhamidipati, and Qamar Munawer. "The ARBAC Model for Role-Based Administration of Roles", ACM Transactions on Information and System Security, 1999.2(1):105-135.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, Q.3
-
8
-
-
35248873795
-
-
R. Sandhu and J. Park, Usage control: A vision for next generation access control. In Proceedings of The 2nd International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, pp 17-31.
-
R. Sandhu and J. Park, "Usage control: A vision for next generation access control". In Proceedings of The 2nd International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, pp 17-31.
-
-
-
-
10
-
-
67649670564
-
Safety Analysis of Usage Control Authorization Models
-
March 21-24, Taipei, Taiwan
-
XinWen Zhang, R.Sandhu. "Safety Analysis of Usage Control Authorization Models".ASIACCS'06 March 21-24, 2006, Taipei, Taiwan.
-
(2006)
ASIACCS'06
-
-
Zhang, X.1
Sandhu, R.2
|