메뉴 건너뛰기




Volumn , Issue , 2014, Pages

Identity access management for Multi-tier cloud infrastructures

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK ARCHITECTURE; SOFTWARE ENGINEERING;

EID: 84904166283     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NOMS.2014.6838229     Document Type: Conference Paper
Times cited : (10)

References (23)
  • 15
    • 0030086382 scopus 로고    scopus 로고
    • Rolebased access control models
    • Feb. [Online]
    • R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Rolebased access control models," Computer, vol. 29, no. 2, pp. 38-47, Feb. 1996. [Online]. Available: http://dx.doi.org/10.1109/2.485845
    • (1996) Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.S.1    Coyne, E.J.2    Feinstein, H.L.3    Youman, C.E.4
  • 16
    • 84956993736 scopus 로고    scopus 로고
    • Role-based authorization constraints specification
    • Nov. [Online]
    • G.-J. Ahn and R. Sandhu, "Role-based authorization constraints specification," ACM Trans. Inf. Syst. Secur., vol. 3, no. 4, pp. 207-226, Nov. 2000. [Online]. Available: http://doi.acm.org/10.1145/382912. 382913
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , Issue.4 , pp. 207-226
    • Ahn, G.-J.1    Sandhu, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.