-
2
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
In Proceedings of IEEE Symposium on Security and Privacy (Oakland, CA, May)
-
Clark, D. and Wilson, D. 1987. A comparison of commercial and military computer security policies. In Proceedings of IEEE Symposium on Security and Privacy (Oakland, CA, May). 184-194
-
(1987)
, pp. 184-194
-
-
Clark, D.1
Wilson, D.2
-
3
-
-
0016949746
-
A lattice model of secure information flow
-
Denning, D. E. 1976. A lattice model of secure information flow. Commun. ACM 19, 2, 236-243
-
(1976)
Commun. ACM
, vol.19
, Issue.2
, pp. 236-243
-
-
Denning, D.E.1
-
4
-
-
84942812332
-
Protection-principles and practice
-
AFIPS Press, Arlington, VA
-
Graham, G. and Denning, P. 1972. Protection-principles and practice. In Proceedings on AFIPS Spring Joint Computer Conference. AFIPS Press, Arlington, VA, 417-429
-
(1972)
Proceedings on AFIPS Spring Joint Computer Conference
, pp. 417-429
-
-
Graham, G.1
Denning, P.2
-
5
-
-
85024266270
-
-
Protection. In Proceedings of the 5th Symposium on Information Sciences and Systems (Princeton, NJ, Mar.)
-
Lampson, B. 1974. Protection. In Proceedings of the 5th Symposium on Information Sciences and Systems (Princeton, NJ, Mar.). 437-443
-
(1974)
, pp. 437-443
-
-
Lampson, B.1
-
6
-
-
0023859517
-
commercial
-
security. In Proceedings of IEEE Symposium on Security and Privacy (Oakland, CA)
-
Lee, T. 1988. Using mandatory integrity to enforce “commercial” security. In Proceedings of IEEE Symposium on Security and Privacy (Oakland, CA). 140-146
-
(1988)
Using mandatory integrity to enforce
, pp. 140-146
-
-
Lee, T.1
-
7
-
-
33846529690
-
Administrative models for role-based access control
-
Ph.D. Dissertation
-
Munawer, Q. 2000. Administrative models for role-based access control. Ph.D. Dissertation
-
(2000)
-
-
Munawer, Q.1
-
8
-
-
0010573970
-
Access rights administration in role-based security systems
-
In Proceedings of the IFIP Working Group 11.3 Working Conference on Database Security. Elsevier North-Holland, Inc., Amsterdam, The Netherlands
-
Nyanchama, M. and Osborn, S. 1994. Access rights administration in role-based security systems. In Proceedings of the IFIP Working Group 11.3 Working Conference on Database Security. Elsevier North-Holland, Inc., Amsterdam, The Netherlands, 37-56
-
(1994)
, pp. 37-56
-
-
Nyanchama, M.1
Osborn, S.2
-
9
-
-
1242349397
-
Modeling mandatory access control in role-based security systems
-
Chapman and Hall Ltd., London, UK
-
Nyanchama, M. and Osborn, S. 1996. Modeling mandatory access control in role-based security systems. In Database Security VIII: Status and Prospects. Chapman and Hall, Ltd., London, UK, 129-144
-
(1996)
Database Security VIII: Status and Prospects
, pp. 129-144
-
-
Nyanchama, M.1
Osborn, S.2
-
10
-
-
0001940210
-
The role graph model and conflict of interest
-
(Feb.)
-
Nyanchama, M. and Osborn, S. 1999. The role graph model and conflict of interest. ACM Trans. Inf. Syst. Secur. 1, 2 (Feb.), 3-33
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.1
, pp. 3-33
-
-
Nyanchama, M.1
Osborn, S.2
-
11
-
-
0031379040
-
Mandatory access control and role-based access control revisited
-
In Proceedings of the Second ACM Workshop on Role-based Access Control (RBAC '97, Fairfax, VA, Nov. 6-7), C. Youman, E. Coyne, and T. Jaeger, Chairs. ACM Press, New York, NY
-
Osborn, S. 1997. Mandatory access control and role-based access control revisited. In Proceedings of the Second ACM Workshop on Role-based Access Control (RBAC '97, Fairfax, VA, Nov. 6-7), C. Youman, E. Coyne, and T. Jaeger, Chairs. ACM Press, New York, NY, 31-40
-
(1997)
, pp. 31-40
-
-
Osborn, S.1
-
12
-
-
34548022060
-
On the interaction between role-based access control and relational databases
-
Status and Prospects (Como, Italy, July 22-24, P. Samarati and R. S. Sandhu, Eds. Chapman and Hall, Ltd., London, UK
-
Osborn, S., Reid, L. K., and Wesson, G. J. 1997. On the interaction between role-based access control and relational databases. In Proceedings of the Tenth Annual IFIP TC11/ WG11.3 International Conference on Database Security: Volume X: Status and Prospects (Como, Italy, July 22-24, 1996), P. Samarati and R. S. Sandhu, Eds. Chapman and Hall, Ltd., London, UK, 275-287
-
(1997)
Proceedings of the Tenth Annual IFIP TC11/ WG11.3 International Conference on Database Security
, vol.X
, pp. 275-287
-
-
Osborn, S.1
Reid, L.K.2
Wesson, G.J.3
-
13
-
-
0027699087
-
Lattice-based access control models
-
Sandhu, R. S. 1993. Lattice-based access control models. IEEE Computer 26, 11, 9-19
-
(1993)
IEEE Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.S.1
-
14
-
-
50249183308
-
Role hierarchies and constraints for lattice-based access controls
-
In Proceedings of the Conference on Computer Security (ESORICS 96, Rome, Italy), E. Bertino, H. Kurth, G. Martella, and E. Montolivo, Eds. Springer-Verlag, New York, NY
-
Sandhu, R. 1996. Role hierarchies and constraints for lattice-based access controls. In Proceedings of the Conference on Computer Security (ESORICS 96, Rome, Italy), E. Bertino, H. Kurth, G. Martella, and E. Montolivo, Eds. Springer-Verlag, New York, NY, 65-79
-
(1996)
, pp. 65-79
-
-
Sandhu, R.1
-
15
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
(Feb.)
-
Sandhu, R. S., Bhamidipati, V., and Munawer, Q. 1999. The ARBAC97 model for role-based administration of roles. ACM Trans. Inf. Syst. Secur. 1, 2 (Feb.), 105-135
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.1
, pp. 105-135
-
-
Sandhu, R.S.1
Bhamidipati, V.2
Munawer, Q.3
-
16
-
-
0030086382
-
Role-based access control models
-
(Feb.)
-
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman, C. E. 1996. Role-based access control models. IEEE Computer 29, 2 (Feb.), 38-47
-
(1996)
IEEE Computer
, vol.29
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
17
-
-
0031599992
-
How to do discretionary access control using roles
-
In Proceedings of the Third ACM Workshop on Role-Based Access Control (RBAC '98, Fairfax, VA, Oct. 22-23), C. Youman and T. Jaeger, Chairs. ACM Press, New York, NY
-
Sandhu, R. and Munawer, Q. 1998. How to do discretionary access control using roles. In Proceedings of the Third ACM Workshop on Role-Based Access Control (RBAC '98, Fairfax, VA, Oct. 22-23), C. Youman and T. Jaeger, Chairs. ACM Press, New York, NY, 47-54
-
(1998)
, pp. 47-54
-
-
Sandhu, R.1
Munawer, Q.2
-
18
-
-
0028513932
-
Access control: Principles and practice
-
Sandhu, R. and Samarati, P. 1994. Access control: Principles and practice. IEEE Commun. Mag. 32, 9, 40-48
-
(1994)
IEEE Commun. Mag.
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.1
Samarati, P.2
-
19
-
-
0037510581
-
Authentication, access control and intrusion detection
-
A. B. Tucker, Ed. CRC Press, Inc., Boca Raton, FL
-
Sandhu, R. S. and Samarati, P. 1997. Authentication, access control and intrusion detection. In The Computer Science and Engineering Handbook, A. B. Tucker, Ed. CRC Press, Inc., Boca Raton, FL, 1929-1948
-
(1997)
The Computer Science and Engineering Handbook
, pp. 1929-1948
-
-
Sandhu, R.S.1
Samarati, P.2
-
20
-
-
6444224063
-
Implementing the Clark/Wilson integrity policy using current technology
-
In Proceedings of the 11th National Computer Security Conference (NIST-NCSC, Baltimore, Maryland, Oct.17-20). National Institute of Standards and Technology, Gaithersburg, MD
-
Schockley, W. 1988. Implementing the Clark/Wilson integrity policy using current technology. In Proceedings of the 11th National Computer Security Conference (NIST-NCSC, Baltimore, Maryland, Oct.17-20). National Institute of Standards and Technology, Gaithersburg, MD, 29-37
-
(1988)
, pp. 29-37
-
-
Schockley, W.1
|