메뉴 건너뛰기




Volumn 1995, Issue , 2001, Pages 88-106

Tower: A language for role based access control

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84937410258     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44569-2_6     Document Type: Conference Paper
Times cited : (14)

References (16)
  • 1
    • 0030678389 scopus 로고    scopus 로고
    • A logic for state transformations in authorization policies
    • Rockport MA, USA, IEEE Computer Society Press
    • Bai, Y., and Varadharajan, V.’A logic for state transformations in authorization policies", Proceedings of the 10th IEEE Computer Security Foundations Workshop, Rockport MA, USA, 1997, IEEE Computer Society Press, pp. 173-183.
    • (1997) Proceedings of the 10Th IEEE Computer Security Foundations Workshop , pp. 173-183
    • Bai, Y.1    Varadharajan, V.2
  • 5
    • 0141977659 scopus 로고    scopus 로고
    • Issues in the Design of a Language for Role Based Access Control
    • M. Hitchens & V. Varadharajan, Issues in the Design of a Language for Role Based Access Control., ICICS.99, pp. 22-38.
    • ICICS.99 , pp. 22-38
    • Hitchens, M.1    Varadharajan, V.2
  • 7
    • 0023829318 scopus 로고
    • Implementing commercial data integrity with secure Capabilities
    • Oakland CA, USA
    • Karger, P.: “Implementing commercial data integrity with secure Capabilities’, Proceedings of the IEEE Symposium on Security and Privacy, Oakland CA, USA, 1988, pp. 130-39.
    • (1988) Proceedings of the IEEE Symposium on Security and Privacy , pp. 130-139
    • Karger, P.1
  • 11
    • 0030086382 scopus 로고    scopus 로고
    • Role based access control models
    • Sandhu, R., Coyne, E.J., and Feinstein, H.L., “Role based access control models’, IEEE Computer, 1996, 29, (2), pp. 38-47.
    • (1996) IEEE Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1    Coyne, E.J.2    Feinstein, H.L.3
  • 14
    • 0346004750 scopus 로고    scopus 로고
    • Joint action based authorisation schemes’
    • July
    • Varadharajan, V. and Allen, P.: ’Joint action based authorisation schemes’, ACM Operating Systems Review, volume 30, (3), July 1996, pp. 32-45.
    • (1996) ACM Operating Systems Review , vol.30 , Issue.3 , pp. 32-45
    • Varadharajan, V.1    Allen, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.