메뉴 건너뛰기




Volumn 2001-January, Issue , 2001, Pages 127-136

Engineering of role/permission assignments

Author keywords

Access control; Authorization; Databases; Electrical equipment industry; Industrial control; Information systems; Medical services; Permission; Protection; X rays

Indexed keywords

ACCESS CONTROL; DATABASE SYSTEMS; ELECTRIC MACHINE CONTROL; INFORMATION SYSTEMS; SECURITY OF DATA; SECURITY SYSTEMS; X RAYS;

EID: 84949220539     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2001.991529     Document Type: Conference Paper
Times cited : (45)

References (11)
  • 1
    • 84949261417 scopus 로고    scopus 로고
    • A framework for defining an access control service for healthcare information system using roles
    • Fairfax VA, October 28-29
    • Ramaswamy Chandramouli, A Framework for defining an Access Control Service for Healthcare Information System Using Roles, A Presentations for 4th ACM Workshop on Role-Based Access Control, Fairfax VA, October 28-29, 1999
    • (1999) A Presentations for 4th ACM Workshop on Role-Based Access Control
    • Ramaswamy Chandramouli1
  • 6
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • February
    • Ravi Sandhu, Edward Coyne, Hal Feinstein, CharlesYouman, Role-Based Access Control Models, In IEEE Computer, Volume 29, Number 2, February 1996, pages 38-47
    • (1996) IEEE Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1    Coyne, E.2    Feinstein, H.3    Charles Youman4
  • 8
    • 19344364618 scopus 로고    scopus 로고
    • Role-based access control
    • Academic Press
    • Ravi Sandhu, Role-Based Access Control, In Advances in Computers, Vol. 46, Academic Press , 1998
    • (1998) Advances in Computers , vol.46
    • Sandhu, R.1
  • 9
    • 0029423138 scopus 로고
    • Implementing role-based access control using object technology
    • Gaithersburg, MD, November 30-December 1
    • John Barkley. Implementing Role-Based Access Control Using Object Technology, In Proceedings of First ACM Workshop on Role-Based Access Control, pages II-93-II-98, Gaithersburg, MD, November 30-December 1, 1995
    • (1995) Proceedings of First ACM Workshop on Role-Based Access Control , pp. 1193-1198
    • Barkley, J.1
  • 11
    • 0033646113 scopus 로고    scopus 로고
    • Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization
    • July 26-27
    • Haio Roeckle, Gerhard Schimpf, Rupert Weidinger, Process-Oriented Approach for Role-Finding to Implement Role-Based Security Administration in a Large Industrial Organization, In Proceedings of Fifth ACM Workshop on Role-Based Access Control, pages 103-116, July 26-27, 2000
    • (2000) Proceedings of Fifth ACM Workshop on Role-Based Access Control , pp. 103-116
    • Roeckle, H.1    Schimpf, G.2    Weidinger, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.