메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 416-425

Modelling contexts in the Or-BAC model

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84944754330     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2003.1254346     Document Type: Conference Paper
Times cited : (110)

References (22)
  • 13
    • 0016984825 scopus 로고
    • Protection in operating systems
    • August
    • M. Harrison, W. Ruzzo, and J. Ullman. Protection in operating systems. CACM, 19(8):461-471, August 1976.
    • (1976) CACM , vol.19 , Issue.8 , pp. 461-471
    • Harrison, M.1    Ruzzo, W.2    Ullman, J.3
  • 15
    • 0011795795 scopus 로고    scopus 로고
    • Provisional authorizations
    • editor A. Ghosh, editor, Kluwer Academic Publishers
    • S. Jajodia, M. Kudo, and V.S. Subrahmanian. Provisional Authorizations. In editor A. Ghosh, editor, E-commerce Security and Privacy, pages 133-159. Kluwer Academic Publishers, 2001.
    • (2001) E-commerce Security and Privacy , pp. 133-159
    • Jajodia, S.1    Kudo, M.2    Subrahmanian, V.S.3
  • 22
    • 0031387996 scopus 로고    scopus 로고
    • TMAC: A primitive for Applying RBAC in collaborative environment
    • Fair Fax, Virginia, USA
    • Roshan K. Thomas. TMAC: A primitive for Applying RBAC in collaborative environment. In 2nd ACM, Workshop on RBAC, pages 13-19, Fair Fax, Virginia, USA, 1997.
    • (1997) 2nd ACM, Workshop on RBAC , pp. 13-19
    • Thomas, R.K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.