-
2
-
-
3142653715
-
-
PhD thesis, Birbeck College, University of London, UK
-
J. Crampton. Authorizations and Antichains. PhD thesis, Birbeck College, University of London, UK, 2002.
-
(2002)
Authorizations and Antichains
-
-
Crampton, J.1
-
6
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Aug.
-
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed NIST standard for role-based access control. ACM Transactions on Information and Systems Security (TISSEC), 4(3):224-274, Aug. 2001.
-
(2001)
ACM Transactions on Information and Systems Security (TISSEC)
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
8
-
-
0016984825
-
Protection in operating systems
-
Aug.
-
M. A. Harrison, W. L. Ruzzo, and J. D. Ullman. Protection in operating systems. Communications of the ACM, 19(8):461-471, Aug. 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
12
-
-
3142654848
-
-
Reprinted in , Jan
-
B. W. Lampson. Protection. In Proceedings of the 5th Princeton Conference on Information Sciences and Systems, 1971. Reprinted in ACM Operating Systems Review, 8(1):18-24, Jan 1974.
-
(1974)
ACM Operating Systems Review
, vol.8
, Issue.1
, pp. 18-24
-
-
-
15
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
Feb.
-
N. Li, W. H. Winsborough, and J. C. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35-86, Feb. 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
16
-
-
0017512599
-
A linear time algorithm for deciding subject security
-
R. J. Lipton and L. Snyder. A linear time algorithm for deciding subject security. Journal of the ACM, 24(3):455-464, 1977.
-
(1977)
Journal of the ACM
, vol.24
, Issue.3
, pp. 455-464
-
-
Lipton, R.J.1
Snyder, L.2
-
19
-
-
0001549660
-
The ARBAC97 model for role-based aministration of roles
-
Feb.
-
R. Sandhu, V. Bhamidipati, and Q. Munawer. The ARBAC97 model for role-based aministration of roles. ACM Transactions on Information and Systems Security (TISSEC), 2(1):105-135, Feb. 1999.
-
(1999)
ACM Transactions on Information and Systems Security (TISSEC)
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, Q.3
-
20
-
-
0023999796
-
The schematic protection model: Its definition and analysis for acyclic attenuating systems
-
R. S. Sandhu. The schematic protection model: Its definition and analysis for acyclic attenuating systems. Journal of the ACM, 35(2):404-432, 1988.
-
(1988)
Journal of the ACM
, vol.35
, Issue.2
, pp. 404-432
-
-
Sandhu, R.S.1
-
22
-
-
0030086382
-
Role-based access control models
-
February
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, February 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
|