메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 202-207

Specification and classification of role-based authorization policies

Author keywords

Access control; Authorization; Collaborative work; Computer crime; Computer errors; Conferences; Costs; Formal languages; Permission; Specification languages

Indexed keywords

COMPUTATIONAL LINGUISTICS; COMPUTER CRIME; COSTS; DISTRIBUTED COMPUTER SYSTEMS; FORMAL LANGUAGES; LAW ENFORCEMENT; SPECIFICATION LANGUAGES; SPECIFICATIONS;

EID: 84944399014     PISSN: 15244547     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ENABL.2003.1231408     Document Type: Conference Paper
Times cited : (17)

References (9)
  • 2
    • 84956993736 scopus 로고    scopus 로고
    • Role-based Authorization Constraints Specification
    • ACM, November
    • Gail J. Ahn and Ravi S. Sandhu. Role-based Authorization Constraints Specification. ACM Transactions on Information and System Security, pages 207-226, Vol. 3, No. 4, ACM, November 2000
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 207-226
    • Ahn, G.J.1    Sandhu, R.S.2
  • 5
    • 0029711136 scopus 로고    scopus 로고
    • A formal model for role-based access control with constraints
    • Kenmare, Ireland, June
    • Luigi Giuri and Pietro Iglio. A formal model for role-based access control with constraints. In Proceedings of IEEE Computer Security Foundations Workshop, pages 136-145, Kenmare, Ireland, June 1996.
    • (1996) Proceedings of IEEE Computer Security Foundations Workshop , pp. 136-145
    • Giuri, L.1    Iglio, P.2
  • 7
    • 50249183308 scopus 로고    scopus 로고
    • Role hierarchies and constraints for lattice-based access controls
    • Elisa Bertino, editor, Proc. Fourth European Symposium on Research in Computer Security. Springer-Verlag, Rome, Italy, Published as Computer Security-ESORICS96
    • Ravi S. Sandhu. Role hierarchies and constraints for lattice-based access controls. In Elisa Bertino, editor, Proc. Fourth European Symposium on Research in Computer Security. Springer-Verlag, Rome, Italy, 1996. Published as Lecture Notes in Computer Science, Computer Security-ESORICS96.
    • (1996) Lecture Notes in Computer Science
    • Sandhu, R.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.