-
2
-
-
0004116989
-
-
Second Edition, MIT Press, ISBN 0-262-03293-7
-
T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, "Introduction to Algorithms", Second Edition, MIT Press, 2001, ISBN 0-262-03293-7
-
(2001)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
4
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
August
-
D. Ferraiolo, R. Sandhu, S. Gavrila, D. Kuhn, and R. Chandramouli, "Proposed NIST standard for role-based access control," ACM Transactions on Information and Systems Security, vol. 4, no. 3, pp. 224-274, August 2001.
-
(2001)
ACM Transactions on Information and Systems Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.4
Chandramouli, R.5
-
5
-
-
17444406680
-
Generalized Temporal Role Based Access Control Model
-
Jan
-
J. B. D. Joshi, E. Bertino, U. Latif, and A. Ghafoor, "Generalized Temporal Role Based Access Control Model," IEEE Transactions on Knowledge and Data Engineering, Volume 7, Issue 1, Jan. 2005.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.7
, Issue.1
-
-
Joshi, J.B.D.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
6
-
-
0242625215
-
Temporal hierarchies and inheritance semantics for GTRBAC
-
ACM Press, New York, NY, USA
-
J. B. D. Joshi, E. Bertino, and A. Ghafoor, "Temporal hierarchies and inheritance semantics for GTRBAC", In Proceedings of the 7th ACM symposium on Access control models and technologies, ACM Press, New York, NY, USA, 74-83.
-
Proceedings of the 7th ACM symposium on Access control models and technologies
, pp. 74-83
-
-
Joshi, J.B.D.1
Bertino, E.2
Ghafoor, A.3
-
7
-
-
57349090826
-
Formal Foundations for hybrid hierarchies in GTRBAC, accepted by ACM Transactions on Information and System
-
James, B.D. Joshi, Elisa Bertino, Arif Ghafoor and Yue Zhang, "Formal Foundations for hybrid hierarchies in GTRBAC", accepted by ACM Transactions on Information and System Security.
-
Security
-
-
James, B.D.J.1
Bertino, E.2
Ghafoor, A.3
Zhang, Y.4
-
8
-
-
37249020924
-
A Critique of the ANSI Standard on Role-Based Access Control
-
Nov/Dec
-
Ninghui Li, Ji-Won Byun, Elisa Bertino, "A Critique of the ANSI Standard on Role-Based Access Control," IEEE Security and Privacy, vol. 5, no. 6, pp. 41-49, Nov/Dec, 2007
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.6
, pp. 41-49
-
-
Li, N.1
Byun, J.-W.2
Bertino, E.3
-
9
-
-
0002848803
-
The uses of role hierarchies in access control
-
Fairfax, Virginia, United States
-
J. D. Moffett and E. C. Lupu, "The uses of role hierarchies in access control", Proceedings of the fourth ACM workshop on Role-based access control, Fairfax, Virginia, United States, 1999, pp. 153-160.
-
(1999)
Proceedings of the fourth ACM workshop on Role-based access control
, pp. 153-160
-
-
Moffett, J.D.1
Lupu, E.C.2
-
11
-
-
0030086382
-
Role-Based Access Control Models
-
IEEE Press
-
R. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role-Based Access Control Models", IEEE Computer 29(2): 38-47, IEEE Press, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
12
-
-
0031600970
-
Role activation hierarchies
-
Fairfax, Virginia, United States
-
R. Sandhu, "Role activation hierarchies", Proceedings of the third ACM workshop on Role-based access control, Fairfax, Virginia, United States, 1998, pp. 33-40.
-
(1998)
Proceedings of the third ACM workshop on Role-based access control
, pp. 33-40
-
-
Sandhu, R.1
-
13
-
-
0141902726
-
Role Based Access Control for the World Wide Web
-
J.Barkley, A.V. Cincotta, D.F. Ferraiolo, S. Gavrila D.R. Kuhn, "Role Based Access Control for the World Wide Web", 20th National Computer Security Conference (1997)
-
(1997)
20th National Computer Security Conference
-
-
Barkley, J.1
Cincotta, A.V.2
Ferraiolo, D.F.3
Gavrila, S.4
Kuhn, D.R.5
-
14
-
-
34548013110
-
-
Chen, L. and Crampton, J. 2007. Inter-domain role mapping and least privilege. In Proceedings of the 12th ACM Symposium on Access Control Models and Technologies (Sophia Antipolis, France, June 20 - 22, 2007). SACMAT '07. ACM, New York, NY, 157-162.
-
Chen, L. and Crampton, J. 2007. Inter-domain role mapping and least privilege. In Proceedings of the 12th ACM Symposium on Access Control Models and Technologies (Sophia Antipolis, France, June 20 - 22, 2007). SACMAT '07. ACM, New York, NY, 157-162.
-
-
-
|