-
1
-
-
84928693825
-
Merging heterogeneous security orderings
-
Martella Bertino, Kurth and Montolivo, editors, LNCS1146, Springer-Verlag
-
P.A. Bonatti, M.L. Sapino, and V.S Subrahmanian. Merging heterogeneous security orderings. In Martella Bertino, Kurth and Montolivo, editors, Computer Security - ESORICS96, LNCS1146, pages 183-197. Springer-Verlag, 1996.
-
(1996)
Computer Security - ESORICS96
, pp. 183-197
-
-
Bonatti, P.A.1
Sapino, M.L.2
Subrahmanian, V.S.3
-
3
-
-
84904248063
-
-
Oracle Corporation. Oracle Version 7, Chapters 6 & 7
-
Oracle Corporation. Oracle Version 7, Chapters 6 & 7. http://www.oracle.com/security/html/chap_6.html. 1995.
-
(1995)
-
-
-
4
-
-
84949776025
-
An authorization model for federated systems
-
Martella Bertino, Kurth and Montolivo, editors, LNCS 1146, Springer-Verlag
-
S. di Virmercati and P. Samarati. An authorization model for federated systems. In Martella Bertino, Kurth and Montolivo, editors, ESORICS96, LNCS 1146, pages 99-117. Springer-Verlag, 1996.
-
(1996)
ESORICS96
, pp. 99-117
-
-
di Virmercati, S.1
Samarati, P.2
-
8
-
-
0010573970
-
Access rights administration in role-based security systems
-
J. Biskup, M. Morgenstem, and C. E. Landwehr, editors, North-Holland
-
M. Nyanchama and S. L. Osborn. Access rights administration in role-based security systems. In J. Biskup, M. Morgenstem, and C. E. Landwehr, editors, Database Security, VIII, Status and Prospects WG11.3 Working Conference on Database Security, pages 37-56. North-Holland, 1994.
-
(1994)
Database Security, VIII, Status and Prospects WG11.3 Working Conference On Database Security
, pp. 37-56
-
-
Nyanchama, M.1
Osborn, S.L.2
-
9
-
-
0001940210
-
The role graph model and conflict of interest
-
M. Nyanchama and S. L. Osborn. The role graph model and conflict of interest. ACM TISSEC, 2(1):3-33,1999.
-
(1999)
ACM TISSEC
, vol.2
, Issue.1
, pp. 3-33
-
-
Nyanchama, M.1
Osborn, S.L.2
-
11
-
-
50249183308
-
Role hierarchies and constraints for lattice-based access controls
-
LNCS1146, Springer Verlag
-
R. Sandhu. Role hierarchies and constraints for lattice-based access controls. In Computer Security - ESORICS 96, LNCS1146, pages 65-79. Springer Verlag, 1996.
-
(1996)
Computer Security - ESORICS 96
, pp. 65-79
-
-
Sandhu, R.1
-
12
-
-
0030086382
-
Role-based access control models
-
Feb
-
R. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. Role-based access control models. IEEE Computer, 29:38-47, Feb. 1996.
-
(1996)
IEEE Computer
, vol.29
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
13
-
-
0025489261
-
Federated database systems for managing distributed, heterogeneous, and autonomous databases
-
Sept
-
A.P. Sheth and J.A. Larson. Federated database systems for managing distributed, heterogeneous, and autonomous databases. ACM Computing Surveys, 22(3): 183-236, Sept. 1990.
-
(1990)
ACM Computing Surveys
, vol.22
, Issue.3
, pp. 183-236
-
-
Sheth, A.P.1
Larson, J.A.2
-
14
-
-
0010574338
-
Designing security agents for the dok federated system
-
Lin and Qian, editors, Chapman & Hall
-
Z. Tari. Designing security agents for the dok federated system. In Lin and Qian, editors, Database Security XI, pages 35-59. Chapman & Hall, 1997.
-
(1997)
Database Security XI
, pp. 35-59
-
-
Tari, Z.1
|