메뉴 건너뛰기




Volumn 2052, Issue , 2001, Pages 22-26

Future directions in role-based access control models

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; NETWORK ARCHITECTURE; WORK SIMPLIFICATION;

EID: 84955574746     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45116-1_4     Document Type: Conference Paper
Times cited : (23)

References (19)
  • 1
  • 8
    • 0039848243 scopus 로고    scopus 로고
    • Managing trust between collaborating companies using outsourced role based access control
    • Hildmann, T. and Barholdt, J.: Managing trust between collaborating companies using outsourced role based access control. In Proc. of 4th ACM Workshop on Role-Based Access Control. 1999 (105–111)
    • (1999) Proc. Of 4Th ACM Workshop on Role-Based Access Control , pp. 105-111
    • Hildmann, T.1    Barholdt, J.2
  • 9
    • 1942443370 scopus 로고    scopus 로고
    • Tower: A Language for Role Based Access Control
    • Bristol, UK, Springer LNCS 1995
    • Hitchens, M. and Varadharajan, V.: Tower: A Language for Role Based Access Control. Int. Workshop on Policy, Bristol, UK, January 2001, Springer LNCS 1995
    • (2001) Int. Workshop on Policy , vol.January
    • Hitchens, M.1    Varadharajan, V.2
  • 11
    • 0242528825 scopus 로고    scopus 로고
    • On the Increasing Importance of Constraints
    • Fairfax, Virginia (Oct. 28–2 9
    • Jaeger, T.: On the Increasing Importance of Constraints. Proc. 4th ACM Workshop on Role- Based Access Control, Fairfax, Virginia (Oct. 28–2 9, 1999) 33–42
    • (1999) Proc. 4Th ACM Workshop on Role- Based Access Control , pp. 33-42
    • Jaeger, T.1
  • 13
    • 84884311106 scopus 로고    scopus 로고
    • Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies
    • May
    • Osborn, S., Sandhu, R. and Munawer, Q.: Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Trans. on Information and System Security, V. 3, No 2, (May 2000) 85–106
    • (2000) ACM Trans. On Information and System Security , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.1    Sandhu, R.2    Munawer, Q.3
  • 14
    • 0030086382 scopus 로고    scopus 로고
    • Role-Based Access Control Models
    • Feb
    • Sandhu, R., Coyne, E., Feinstein, H. and Youman, C.: Role-Based Access Control Models. IEEE Computer, V. 29, No 2. (Feb. 1996) 38–47
    • (1996) IEEE Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1    Coyne, E.2    Feinstein, H.3    Youman, C.4
  • 17
    • 0033645573 scopus 로고    scopus 로고
    • Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way
    • Berlin. (July 26–2 8
    • Sandhu, R.: Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way. Proc. 5th ACM Workshop on RBAC, Berlin. (July 26–2 8, 2000) 111–119
    • (2000) Proc. 5Th ACM Workshop on RBAC , pp. 111-119
    • Sandhu, R.1
  • 18
    • 0033652039 scopus 로고    scopus 로고
    • The NIST Model for Role-Based Access Control: Towards A Unified Standard
    • Sandhu, R., Ferraiolo, D. and Kuhn, R.: The NIST Model for Role-Based Access Control: Towards A Unified Standard. Proc. 5th ACM Workshop on RBAC. 47–63
    • Proc. 5Th ACM Workshop on RBAC , pp. 47-63
    • Sandhu, R.1    Ferraiolo, D.2    Kuhn, R.3
  • 19
    • 0002841051 scopus 로고    scopus 로고
    • Task-based Authorization Controls (TBAC): Models for Active and Enterprise-Oriented Authorization Management
    • Chapman & Hall
    • Thomas, R. and Sandhu, R.: Task-based Authorization Controls (TBAC): Models for Active and Enterprise-Oriented Authorization Management. In Database Security XI: Status and Prospects, Chapman & Hall 1998. 262–275
    • (1998) Database Security XI: Status and Prospects , pp. 262-275
    • Thomas, R.1    Sandhu, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.