-
1
-
-
84944792110
-
TRBAC: A Temporal Role-Based Access Control Model
-
Aug
-
E. Bertino, P.A. Bonatti, and E. Ferrari, "TRBAC: A Temporal Role-Based Access Control Model," ACM Trans. on Information and System Security, vol. 4, no. 3, pp. 191 - 233, Aug. 2001.
-
(2001)
ACM Trans. on Information and System Security
, vol.4
, Issue.3
, pp. 191-233
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
2
-
-
33746614141
-
Real-time processing of range-monitoring queries in heterogeneous mobile databases
-
July
-
Y. Cai, K. A. Hua, G. Cao., T. Xu, "Real-time processing of range-monitoring queries in heterogeneous mobile databases," IEEE Transactions on Mobile Computing, vol. 5, no. 7, pp. 931 - 942, July 2006.
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.7
, pp. 931-942
-
-
Cai, Y.1
Hua, K.A.2
Cao, G.3
Xu, T.4
-
3
-
-
84992227458
-
Proposed NIST Standard for Role-Based Access Control
-
Aug
-
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D.R. Kuhn, and R. Chandramouli, "Proposed NIST Standard for Role-Based Access Control," ACM Trans. on Information and System Security, vol. 4, no. 3, pp. 224 - 274, Aug. 2001.
-
(2001)
ACM Trans. on Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
4
-
-
4143096907
-
Spatial role-based access control model for wireless networks
-
6, 9 Oct
-
F. Hansen and V. Oleshchuk, "Spatial role-based access control model for wireless networks," in Proc. the 58th of IEEE Vehicular Technology Conference, vol. 3, pp. 2093 - 2097, 6 - 9 Oct. 2003.
-
(2003)
Proc. the 58th of IEEE Vehicular Technology Conference
, vol.3
, pp. 2093-2097
-
-
Hansen, F.1
Oleshchuk, V.2
-
5
-
-
17444406680
-
A Generalized Temporal Role-Based Access Control Model
-
Jan
-
J. B. D. Joshi, E. Bertino, U. Latif, and A. Ghafoor, "A Generalized Temporal Role-Based Access Control Model," IEEE Transactions on Knowledge And Data Engineering, vol. 17, no. 1, pp. 4 - 23, Jan. 2005.
-
(2005)
IEEE Transactions on Knowledge And Data Engineering
, vol.17
, Issue.1
, pp. 4-23
-
-
Joshi, J.B.D.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
6
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
S. Osborn, R. Sandhu, and Q. Munawer, "Configuring role-based access control to enforce mandatory and discretionary access control policies," ACM Trans. on Information and System Security, vol. 3, no. 2, pp. 85 - 106, 2000.
-
(2000)
ACM Trans. on Information and System Security
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.1
Sandhu, R.2
Munawer, Q.3
-
7
-
-
0030086382
-
Role-Based Access Control Models
-
Feb
-
R. S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, "Role-Based Access Control Models," IEEE Computer, vol. 29, issue 2, pp. 38 - 47, Feb. 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
|