-
1
-
-
70450254069
-
-
American National Standards Institute (ANSI) and InterNational Committee for Information Technology Standards (INCITS). ANSI/INCITS 359-2004, Information Technology - Role Based Access Control, 2004.
-
American National Standards Institute (ANSI) and InterNational Committee for Information Technology Standards (INCITS). ANSI/INCITS 359-2004, Information Technology - Role Based Access Control, 2004.
-
-
-
-
2
-
-
48249141905
-
A cost-driven approach to role engineering
-
Fortaleza, Ceará, Brazil
-
rd ACM Symposium on Applied Computing, SAC '08, volume 3, pages 2129-2136, Fortaleza, Ceará, Brazil, 2008.
-
(2008)
rd ACM Symposium on Applied Computing, SAC '08
, vol.3
, pp. 2129-2136
-
-
Colantonio, A.1
Di Pietro, R.2
Ocello, A.3
-
3
-
-
48249156932
-
-
rd International Information Security Conference, SEC '08, 278 of IFIP International Federation for Information Processing, pages 333-347. Springer, 2008.
-
rd International Information Security Conference, SEC '08, volume 278 of IFIP International Federation for Information Processing, pages 333-347. Springer, 2008.
-
-
-
-
4
-
-
77954939957
-
-
th International Information Security Conference, SEC '09, 297 of IFIP International Federation for Information Processing, pages 259-269. Springer, 2009.
-
th International Information Security Conference, SEC '09, volume 297 of IFIP International Federation for Information Processing, pages 259-269. Springer, 2009.
-
-
-
-
5
-
-
77954756226
-
-
th International Information Security Conference, SEC '09, 297 of IFIP International Federation for Information Processing, pages 376-386. Springer, 2009.
-
th International Information Security Conference, SEC '09, volume 297 of IFIP International Federation for Information Processing, pages 376-386. Springer, 2009.
-
-
-
-
8
-
-
0003866267
-
-
John Wiley & Sons, Inc, New York, NY, USA
-
K. Deb. Multi-Objective Optimization Using Evolutionary Algorithms. John Wiley & Sons, Inc., New York, NY, USA, 2001.
-
(2001)
Multi-Objective Optimization Using Evolutionary Algorithms
-
-
Deb, K.1
-
9
-
-
57349100404
-
Fast exact and heuristic methods for role minimization problems
-
th ACM Symposium on Access Control Models and Technologies, SACMAT '08, pages 1-10, 2008.
-
(2008)
th ACM Symposium on Access Control Models and Technologies, SACMAT '08
, pp. 1-10
-
-
Ene, A.1
Horne, W.2
Milosavljevic, N.3
Rao, P.4
Schreiber, R.5
Tarjan, R.E.6
-
15
-
-
37249020924
-
A critique of the ANSI standard on role-based access control
-
N. Li, J.-W. Byun, and E. Bertino. A critique of the ANSI standard on role-based access control. IEEE Security & Privacy, 5(6):41-49, 2007.
-
(2007)
IEEE Security & Privacy
, vol.5
, Issue.6
, pp. 41-49
-
-
Li, N.1
Byun, J.-W.2
Bertino, E.3
-
17
-
-
57349105655
-
Mining roles with semantic meanings
-
th ACM Symposium on Access Control Models and Technologies, SACMAT '08, pages 21-30, 2008.
-
(2008)
th ACM Symposium on Access Control Models and Technologies, SACMAT '08
, pp. 21-30
-
-
Molloy, I.1
Chen, H.2
Li, T.3
Wang, Q.4
Li, N.5
Bertino, E.6
Calo, S.7
Lobo, J.8
-
19
-
-
0038825675
-
Task-role-based access control model
-
S. Oh and S. Park. Task-role-based access control model. Information Systems, 28(6):533-562, 2003.
-
(2003)
Information Systems
, vol.28
, Issue.6
, pp. 533-562
-
-
Oh, S.1
Park, S.2
-
20
-
-
33748319570
-
An effective role administration model using organization structure
-
S. Oh, R. S. Sandhu, and X. Zhang. An effective role administration model using organization structure. ACM Transactions on Information and System Security, TISSEC, 9(2):113-137, 2006.
-
(2006)
ACM Transactions on Information and System Security, TISSEC
, vol.9
, Issue.2
, pp. 113-137
-
-
Oh, S.1
Sandhu, R.S.2
Zhang, X.3
|