-
1
-
-
21144450607
-
-
American National Standards Institute Inc. ANSI-INCITS 359-2004
-
American National Standards Institute Inc. Role Based Access Control, ANSI-INCITS 359-2004, 2004.
-
(2004)
Role Based Access Control
-
-
-
4
-
-
33748079186
-
Core and hierarchical role based access control (RBAC) profile of XACML v2. 0
-
A. Anderson. Core and hierarchical role based access control (RBAC) profile of XACML v2. 0. OASIS Standard, 2005.
-
(2005)
OASIS Standard
-
-
Anderson, A.1
-
5
-
-
70349275455
-
Enforcing authorization policies using transactional memory introspection
-
ACM New York, NY, USA
-
A. Birgisson, M. Dhawan, U. Erlingsson, V. Ganapathy, and L. Iftode. Enforcing authorization policies using transactional memory introspection. In Proceedings of the 15th ACM conference on Computer and communications security, pages 223-234. ACM New York, NY, USA, 2008.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 223-234
-
-
Birgisson, A.1
Dhawan, M.2
Erlingsson, U.3
Ganapathy, V.4
Iftode, L.5
-
8
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
D. F. Ferraiolo, R. S. Sandhu, S. I. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. (TISSEC), 4(3):224-274, 2001.
-
(2001)
ACM Trans. Inf. Syst. Secur. (TISSEC)
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.S.2
Gavrila, S.I.3
Kuhn, D.R.4
Chandramouli, R.5
-
10
-
-
33244470893
-
Verification and change-impact analysis of access-control policies
-
ACM New York, NY, USA
-
K. Fisler, S. Krishnamurthi, L. Meyerovich, and M. Tschantz. Verification and change-impact analysis of access-control policies. In Proceedings of the 27th international conference on Software engineering, pages 196-205. ACM New York, NY, USA, 2005.
-
(2005)
Proceedings of the 27th International Conference on Software Engineering
, pp. 196-205
-
-
Fisler, K.1
Krishnamurthi, S.2
Meyerovich, L.3
Tschantz, M.4
-
13
-
-
33244455252
-
-
Computer Science Department, University of California, Santa Barbara, CA, 93106: 22
-
G. Hughes and T. Bultan. Automated verification of access control policies. Computer Science Department, University of California, Santa Barbara, CA, 93106:2004-22.
-
(2004)
Automated Verification of Access Control Policies
-
-
Hughes, G.1
Bultan, T.2
-
17
-
-
34249745790
-
On mutually exclusive roles and separation-of-duty
-
N. Li, M. Tripunitara, and Z. Bizri. On mutually exclusive roles and separation-of-duty. ACM Transactions on Information and System Security (TISSEC), 10(2):5, 2007.
-
(2007)
ACM Transactions on Information and System Security (TISSEC)
, vol.10
, Issue.2
, pp. 5
-
-
Li, N.1
Tripunitara, M.2
Bizri, Z.3
-
21
-
-
0030086382
-
Role-based access control models
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-based access control models. IEEE computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
23
-
-
0027699087
-
Lattice-based access control models
-
R. S. Sandhu. Lattice-based access control models. IEEE Computer, 26(11):9-19, 1993.
-
(1993)
IEEE Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.S.1
-
25
-
-
0242625217
-
A lightweight approach to specification and analysis of role-based access control extensions
-
New York, NY, USA, ACM
-
A. Schaad and J. D. Moffett. A lightweight approach to specification and analysis of role-based access control extensions. In SACMAT '02: Proceedings of the seventh ACM symposium on Access control models and technologies, pages 13-22, New York, NY, USA, 2002. ACM.
-
(2002)
SACMAT '02: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies
, pp. 13-22
-
-
Schaad, A.1
Moffett, J.D.2
-
26
-
-
33646027053
-
Specification and validation of authorisation constraints using UML and OCL
-
K. Sohr, G.-J. Ahn, M. Gogolla, and L. Migge. Specification and validation of authorisation constraints using UML and OCL. Lecture notes in computer science, 3679:64, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3679
, pp. 64
-
-
Sohr, K.1
Ahn, G.-J.2
Gogolla, M.3
Migge, L.4
-
28
-
-
33748055425
-
Towards reasonability properties for access-control policy languages
-
New York, NY, USA, ACM
-
M. C. Tschantz and S. Krishnamurthi. Towards reasonability properties for access-control policy languages. In SACMAT '06: Proceedings of the eleventh ACM symposium on Access control models and technologies, pages 160-169, New York, NY, USA, 2006. ACM.
-
(2006)
SACMAT '06: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies
, pp. 160-169
-
-
Tschantz, M.C.1
Krishnamurthi, S.2
|