-
2
-
-
34548020563
-
Specifications of a high-level conflict-free firewall policy language for multi-domain networks
-
B. Zhang, E. Al-Shaer, R. Jagadeesan, J. Riely, and C. Pitcher. Specifications of a high-level conflict-free firewall policy language for multi-domain networks. In The Twelth ACM Symposium on Access Control Models and Technologies, pages 185-194, 2007.
-
(2007)
The Twelth ACM Symposium on Access Control Models and Technologies
, pp. 185-194
-
-
Zhang, B.1
Al-Shaer, E.2
Jagadeesan, R.3
Riely, J.4
Pitcher, C.5
-
4
-
-
57349100404
-
Fast exact and heuristic methods for role minimization problems
-
June
-
A. Ene, W. Horne, N. Milosavljevic, P. Rao, R. Schreiber, and R. Tarjan. Fast exact and heuristic methods for role minimization problems. In The ACM Symposium on Access Control Models and Technologies, June 2008.
-
(2008)
The ACM Symposium on Access Control Models and Technologies
-
-
Ene, A.1
Horne, W.2
Milosavljevic, N.3
Rao, P.4
Schreiber, R.5
Tarjan, R.6
-
5
-
-
84992227458
-
Proposed NIST Standard for Role-Based Access Control
-
D. Ferraiolo, R. Sandhu, S. Gavrila, D. Kuhn, and R. Chandramouli. Proposed NIST Standard for Role-Based Access Control. TISSEC, 2001.
-
(2001)
TISSEC
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.4
Chandramouli, R.5
-
6
-
-
4243280162
-
The economic impact of role-based access control
-
National Institute of Standards and Technology, March
-
M. P. Gallagher, A. O'Connor, and B. Kropp. The economic impact of role-based access control. Planning report 02-1, National Institute of Standards and Technology, March 2002.
-
(2002)
Planning report 02-1
-
-
Gallagher, M.P.1
O'Connor, A.2
Kropp, B.3
-
7
-
-
35048813595
-
Tiling databases
-
Discovery Science, Springer-Verlag
-
F. Geerts, B. Goethals, and T. Mielikainen. Tiling databases. In Discovery Science, Lecture Notes in Computer Science, pages 278 - 289. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, pp. 278-289
-
-
Geerts, F.1
Goethals, B.2
Mielikainen, T.3
-
10
-
-
57349105655
-
Mining roles with semantic meanings
-
New York, NY, USA, ACM
-
I. Molloy, H. Chen, T. Li, Q. Wang, N. Li, E. Bertino, S. Calo, and J. Lobo. Mining roles with semantic meanings. In SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies, pages 21-30, New York, NY, USA, 2008. ACM.
-
(2008)
SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies
, pp. 21-30
-
-
Molloy, I.1
Chen, H.2
Li, T.3
Wang, Q.4
Li, N.5
Bertino, E.6
Calo, S.7
Lobo, J.8
-
11
-
-
0030086382
-
Role-based Access Control Models
-
February
-
R. S. Sandhu et al. Role-based Access Control Models. IEEE Computer, pages 38-47, February 1996.
-
(1996)
IEEE Computer
, pp. 38-47
-
-
Sandhu, R.S.1
-
13
-
-
34548052480
-
The role mining problem: Finding a minimal descriptive set of roles
-
Sophia Antipolis, France, June 20-22
-
J. Vaidya, V. Atluri, and Q. Guo. The role mining problem: Finding a minimal descriptive set of roles. In The Twelth ACM Symposium on Access Control Models and Technologies, pages 175-184, Sophia Antipolis, France, June 20-22 2007.
-
(2007)
The Twelth ACM Symposium on Access Control Models and Technologies
, pp. 175-184
-
-
Vaidya, J.1
Atluri, V.2
Guo, Q.3
|