-
1
-
-
0030086382
-
Role-Based Access Control Models
-
IEEE Press
-
R. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role-Based Access Control Models", IEEE Computer 29(2): 38-47, IEEE Press, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
2
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
August
-
D. Ferraiolo, R. Sandhu, S. Gavrila, D. Kuhn, and R. Chandramouli, "Proposed NIST standard for role-based access control," ACM Transactions on Information and Systems Security, vol. 4, no. 3, pp. 224-274, August 2001.
-
(2001)
ACM Transactions on Information and Systems Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.4
Chandramouli, R.5
-
3
-
-
63449142396
-
-
ANSI. American national standard for information technology - role based access control. ANSI INCITS 359-2004, February 2004.
-
ANSI. American national standard for information technology - role based access control. ANSI INCITS 359-2004, February 2004.
-
-
-
-
4
-
-
0031600970
-
Role activation hierarchies
-
Fairfax, Virginia, United States
-
R. Sandhu, "Role activation hierarchies", Proceedings of the third ACM workshop on Role-based access control, Fairfax, Virginia, United States, 1998, pp. 33-40.
-
(1998)
Proceedings of the third ACM workshop on Role-based access control
, pp. 33-40
-
-
Sandhu, R.1
-
5
-
-
63449099260
-
-
J. D. Moffett and E. C. Lupu, The uses of role hierarchies in access control, Proceedings of the fourth ACM workshop on Role-based access control, 1999, pp. 153-160.Joshi,
-
J. D. Moffett and E. C. Lupu, "The uses of role hierarchies in access control", Proceedings of the fourth ACM workshop on Role-based access control, 1999, pp. 153-160.Joshi,
-
-
-
-
6
-
-
0242625215
-
Temporal hierarchies and inheritance semantics for GTRBAC
-
Monterey, California, USA
-
J. B. D., Bertino, E., Ghafoor, A, "Temporal hierarchies and inheritance semantics for GTRBAC", Proceedings of the seventh ACM symposium on Access control models and technologies, Monterey, California, USA, 2002, 74 - 83.
-
(2002)
Proceedings of the seventh ACM symposium on Access control models and technologies
, pp. 74-83
-
-
D, J.B.1
Bertino, E.2
Ghafoor, A.3
-
7
-
-
39149138668
-
Formal Foundation for Hybrid Hierarchies in GTRBAC
-
Jan
-
Joshi, J.B.D., Bertino, E., Ghafoor, A, and Zhang, Y, "Formal Foundation for Hybrid Hierarchies in GTRBAC", ACM Transactions on Information and System Security (TISSEC), Vol. 10, No. 4, Jan, 2008, pp. 1-39
-
(2008)
ACM Transactions on Information and System Security (TISSEC)
, vol.10
, Issue.4
, pp. 1-39
-
-
Joshi, J.B.D.1
Bertino, E.2
Ghafoor, A.3
Zhang, Y.4
-
9
-
-
57349156959
-
UAQ: A Framework for User Authorization Query Processing in RBAC extended with Hybrid Hierarchy and Constraints
-
Jun, Estes Park, CO
-
Y. Zhang and J. B. D. Joshi, "UAQ: A Framework for User Authorization Query Processing in RBAC extended with Hybrid Hierarchy and Constraints", ACM symposium on access control models and technologies (SACMAT), Jun. 2008, Estes Park, CO.
-
(2008)
ACM symposium on access control models and technologies (SACMAT)
-
-
Zhang, Y.1
Joshi, J.B.D.2
|