-
1
-
-
3142510989
-
Administrative scope: A foundation for role-based administrative models
-
May
-
J. Crampton, G. Loizou, "Administrative scope: A foundation for role-based administrative models", ACM Transactions on Information and System Security (TISSEC), Volume 6, Issue 2, May. 2003, pp. 201-231.
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, Issue.2
, pp. 201-231
-
-
Crampton, J.1
Loizou, G.2
-
3
-
-
0002262722
-
Role-based access control (RBAC): Features and motivations
-
New Orleans, LA, Dec
-
D. Ferraioio, J. Cugini, and R. Kuhn, "Role-based access control (RBAC): Features and motivations", In Proceedings of 11th Annual Computer Security Application Conference, New Orleans, LA, Dec. 1995, pp. 241-48.
-
(1995)
Proceedings of 11th Annual Computer Security Application Conference
, pp. 241-248
-
-
Ferraioio, D.1
Cugini, J.2
Kuhn, R.3
-
4
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
August
-
D. Ferraiolo, R. Sandhu, S. Gavrila, D. Kuhn, and R. Chandramouli, " Proposed NIST standard for role-based access control," ACM Transactions on Information and Systems Security, vol. 4, no. 3, pp. 224-274, August 2001.
-
(2001)
ACM Transactions on Information and Systems Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.4
Chandramouli, R.5
-
6
-
-
0242625215
-
Temporal hierarchies and inheritance semantics for GTRBAC
-
New York, NY, USA, pp
-
J. B. D. Joshi, E. Bertino, and A Ghafoor, "Temporal hierarchies and inheritance semantics for GTRBAC", In Proceedings of the 7th ACM symposium on Access control models and technologies, New York, NY, USA, pp. 74-83.
-
Proceedings of the 7th ACM symposium on Access control models and technologies
, pp. 74-83
-
-
Joshi, J.B.D.1
Bertino, E.2
Ghafoor, A.3
-
7
-
-
17444406680
-
Generalized Temporal Role Based Access Control Model
-
Jan
-
J. B. D. Joshi, E. Bertino, U. Latif, and A. Ghafoor, "Generalized Temporal Role Based Access Control Model," IEEE Transactions on Knowledge and Data Engineering, Volume 7, Issue 1, Jan. 2005.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.7
, Issue.1
-
-
Joshi, J.B.D.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
9
-
-
37249020924
-
A Critique of the ANSI Standard on Role Based Access Control
-
to appear in
-
N. Li, "A Critique of the ANSI Standard on Role Based Access Control", to appear in IEEE Security and Privacy.
-
IEEE Security and Privacy
-
-
Li, N.1
-
12
-
-
0030086382
-
Role-Based Access Control Models
-
IEEE Press
-
R. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role-Based Access Control Models", IEEE Computer 29(2): pp. 38-47, IEEE Press, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
13
-
-
0031600970
-
Role activation hierarchies
-
Fairfax, Virginia, United States
-
R. Sandhu, "Role activation hierarchies", Proceedings of the third ACM workshop on Role-based access control, Fairfax, Virginia, United States, 1998, pp. 33-40.
-
(1998)
Proceedings of the third ACM workshop on Role-based access control
, pp. 33-40
-
-
Sandhu, R.1
-
14
-
-
0001549660
-
The ARBAC97 Model for Role-Based Administration of Roles
-
Feb
-
R. Sandhu, V. Bhamidipati, and Q. Munawer, "The ARBAC97 Model for Role-Based Administration of Roles", ACM Transactions on Information and System Security (TISSEC), Volume 2, Issue 1, Feb. 1999, pp. 105-135.
-
(1999)
ACM Transactions on Information and System Security (TISSEC)
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, Q.3
|