-
1
-
-
84956993736
-
Role-based authorization constraints specification
-
Nov.
-
Ahn, G. and Sandhu, R. 2000. Role-based authorization constraints specification. ACM Trans. Inf. Syst. Sec. 3, 4 (Nov.).
-
(2000)
ACM Trans. Inf. Syst. Sec.
, vol.3
, Issue.4
-
-
Ahn, G.1
Sandhu, R.2
-
2
-
-
0025028340
-
Naming and grouping privileges to simplify security management in large databases
-
IEEE Press, Los Alamitos, Calif.
-
Baldwin, R. W. 1990. Naming and grouping privileges to simplify security management in large databases. In Proceedings of the Symposium on Security and Privacy, IEEE Press, Los Alamitos, Calif., 116-132.
-
(1990)
Proceedings of the Symposium on Security and Privacy
, pp. 116-132
-
-
Baldwin, R.W.1
-
3
-
-
0003400251
-
Secure computer systems: Unified exposition and MULTICS
-
The MITRE Corporation, Bedford, Mass., March
-
Bell, D. and La Padula. 1976. Secure computer systems: Unified exposition and MULTICS. Tech. Rep. ESD-TR-75-306, The MITRE Corporation, Bedford, Mass., March.
-
(1976)
Tech. Rep. ESD-TR-75-306
-
-
Bell, D.1
La, P.2
-
4
-
-
0033645572
-
TRBAC: A temporal role-based access control model
-
Bertino, E., Bonatti, P., and Ferrari, E. 2000. TRBAC: A temporal role-based access control model. In Proceedings of the Fifth ACM Workshop on Role Based Access Control, 21-30.
-
(2000)
Proceedings of the Fifth ACM Workshop on Role Based Access Control
, pp. 21-30
-
-
Bertino, E.1
Bonatti, P.2
Ferrari, E.3
-
7
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
IEEE Press, Los Alamitos, Calif.
-
Clark, D. and Wilson, D. 1987. A comparison of commercial and military computer security policies. In proceedings of the Symposium on Security and Privacy, IEEE Press, Los Alamitos, Calif., 184-194.
-
(1987)
proceedings of the Symposium on Security and Privacy
, pp. 184-194
-
-
Clark, D.1
Wilson, D.2
-
9
-
-
33745638955
-
Final report: NIST small business innovative research (SBIR) grant: Role based access control: phase 2
-
SETA Corp., October
-
Feinstein, H. 1996. Final report: NIST small business innovative research (SBIR) grant: Role based access control: phase 2. SETA Corp., October.
-
(1996)
-
-
Feinstein, H.1
-
11
-
-
0002422823
-
A role-based access control model and reference implementation within a corporate internet
-
Ferraiolo, D., Barkley, J., and Kuhn, R. 1999. A role-based access control model and reference implementation within a corporate internet. ACM Trans. Inf. Syst. Sec. 2, 1.
-
(1999)
ACM Trans. Inf. Syst. Sec.
, vol.2
, Issue.1
-
-
Ferraiolo, D.1
Barkley, J.2
Kuhn, R.3
-
12
-
-
0002262722
-
Role-based access control: Features and motivations
-
IEEE Press, Los Alamitos, Calif
-
Ferraiolo, D., Cugini, J., and Kuhn, R. 1995. Role-based access control: Features and motivations. In Proceedings of the Annual Computer Security Applications Conference, IEEE Press, Los Alamitos, Calif.
-
(1995)
Proceedings of the Annual Computer Security Applications Conference
-
-
Ferraiolo, D.1
Cugini, J.2
Kuhn, R.3
-
13
-
-
0000985630
-
An examination of federal and commercial access control policy needs
-
Ferraiolo, D., Gilbert, D., and Lynch, N. 1993. An examination of federal and commercial access control policy needs. In Proceedings of the NIST-NSA National (USA) Computer Security Conference, 107-116.
-
(1993)
Proceedings of the NIST-NSA National (USA) Computer Security Conference
, pp. 107-116
-
-
Ferraiolo, D.1
Gilbert, D.2
Lynch, N.3
-
15
-
-
0029711136
-
A formal model for role based access control with constraints
-
IEEE Press, Los Alamitos, Calif.
-
Giuri, L. and Iglio, P. 1996. A formal model for role based access control with constraints. In Proceedings of the Computer Security Foundations Workshop, IEEE Press, Los Alamitos, Calif., 136-145.
-
(1996)
Proceedings of the Computer Security Foundations Workshop
, pp. 136-145
-
-
Giuri, L.1
Iglio, P.2
-
16
-
-
0031682433
-
On the formal definition of separation-of-duty policies and their composition
-
IEEE Press, Los Alamitos, Calif
-
Gligor, V. D., Gavrila, S. I., and Ferraiolo, D. F. 1998. On the formal definition of separation-of-duty policies and their composition. In Proceedings of the Symposium on Security and Privacy, IEEE Press, Los Alamitos, Calif.
-
(1998)
Proceedings of the Symposium on Security and Privacy
-
-
Gligor, V.D.1
Gavrila, S.I.2
Ferraiolo, D.F.3
-
20
-
-
0000206310
-
Security models for web-based applications
-
Feb.
-
Joshi, J. B. D., Aref, W. G., Ghafoor, A., and Spafford, E. H. 2001a. Security models for web-based applications. Commun. ACM, 44, 2, Feb. 38-44.
-
(2001)
Commun. ACM
, vol.44
, Issue.2
, pp. 38-44
-
-
Joshi, J.B.D.1
Aref, W.G.2
Ghafoor, A.3
Spafford, E.H.4
-
21
-
-
0035251598
-
Digital government security infrastructure design challenges
-
Feb.
-
Joshi, J., Ghafoor, A., Aref, W. G., and Spafford, E. H. 2001b. Digital government security infrastructure design challenges. IEEE Comput. 33, 2, Feb. 66-72.
-
(2001)
IEEE Comput.
, vol.33
, Issue.2
, pp. 66-72
-
-
Joshi, J.1
Ghafoor, A.2
Aref, W.G.3
Spafford, E.H.4
-
23
-
-
0031346670
-
Mutual exclusion as a means of implementing separation of duty requirements in role based access control systems
-
Kuhn, R. 1997. Mutual exclusion as a means of implementing separation of duty requirements in role based access control systems. In Proceedings of the Second ACM Workshop on Role Based Access Control, 23-30.
-
(1997)
Proceedings of the Second ACM Workshop on Role Based Access Control
, pp. 23-30
-
-
Kuhn, R.1
-
25
-
-
0025022888
-
Beyond the pale of MAC and DAC-Defining new forms of access control
-
IEEE Press, Los Alamitos, Calif.
-
McCollum, C., Messing, J., and Notargiacomo, L. 1990. Beyond the pale of MAC and DAC-Defining new forms of access control. In Proceedings of the Symposium on Security and Privacy, IEEE Press, Los Alamitos, Calif., 190-900.
-
(1990)
Proceedings of the Symposium on Security and Privacy
, pp. 190-900
-
-
McCollum, C.1
Messing, J.2
Notargiacomo, L.3
-
27
-
-
0010573970
-
Access rights administration in role-based security systems
-
J. Biskup, M. Morgenstern, and C. E. Landwehr, Eds., North-Holland
-
Nyanchama, M. and Osborn, S. 1994. Access rights administration in role-based security systems. In Database Security, VIII: Status and Prospects, J. Biskup, M. Morgenstern, and C. E. Landwehr, Eds., North-Holland, 37-56.
-
(1994)
Database Security, VIII: Status and Prospects
, pp. 37-56
-
-
Nyanchama, M.1
Osborn, S.2
-
29
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
Osborn, S., Sandhu, R., and Munawer, Q. 2000. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Inf. Syst. Sec. 3, 2.
-
(2000)
ACM Trans. Inf. Syst. Sec.
, vol.3
, pp. 2
-
-
Osborn, S.1
Sandhu, R.2
Munawer, Q.3
-
30
-
-
0033312487
-
Role-based administration of user-role assignment: the URA97 model and its oracle implementation
-
Sandhu, R. and Bhamidipati, V. 1997. Role-based administration of user-role assignment: the URA97 model and its oracle implementation. J. Compu. Sec. 7.
-
(1997)
J. Compu. Sec.
, pp. 7
-
-
Sandhu, R.1
Bhamidipati, V.2
-
32
-
-
19344364618
-
Role-based access control
-
M. Zelkowitz Eds. Academic
-
Sandhu, R. 1998b. Role-based access control. In Advances in Computers, vol. 46, M. Zelkowitz Eds. Academic, 237-286.
-
(1998)
Advances in Computers
, vol.46
, pp. 237-286
-
-
Sandhu, R.1
-
33
-
-
0024125647
-
Transaction control expressions for separation of duties
-
(Orlando, Fla.). IEEE Computer Society Press, Dec. Los Alamitos, Calif.
-
Sandhu, R. 1988. Transaction control expressions for separation of duties. In Proceedings of the Fourth Aerospace Computer Security Applications Conference (Orlando, Fla.). IEEE Computer Society Press, Dec. Los Alamitos, Calif., 282-286.
-
(1988)
Proceedings of the Fourth Aerospace Computer Security Applications Conference
, pp. 282-286
-
-
Sandhu, R.1
-
34
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
(Feb.)
-
Sandhu, R., Bhamidipati, V., and Munawer, Q. 1999. The ARBAC97 model for role-based administration of roles. ACM Trans. Inf. Sys. Sec. 2, 1, (Feb.), 105-135.
-
(1999)
ACM Trans. Inf. Sys. Sec.
, vol.2
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, Q.3
-
35
-
-
0002045898
-
Role-based access control models
-
(Feb).
-
Sandhu, R., Coyne, E., Feinstein, H., and Youman, C. 1996. Role-based access control models. IEEE Comput., 29, (2), (Feb).
-
(1996)
IEEE Comput.
, vol.29
, Issue.2
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
36
-
-
0033652039
-
The NIST model for role-based access control: Towards a unified standard
-
(Berlin, July)
-
Sandhu, R., Ferraiolo, D., and Kuhn, R. 2000. The NIST model for role-based access control: Towards a unified standard. In Proceedings of the Fifth ACM Workshop on Role-Based Access Control (Berlin, July), 47-63.
-
(2000)
Proceedings of the Fifth ACM Workshop on Role-Based Access Control
, pp. 47-63
-
-
Sandhu, R.1
Ferraiolo, D.2
Kuhn, R.3
-
38
-
-
85024277863
-
Market analysis report: NIST small business innovative research (SBIR) grant: Role based access control: Phase 2
-
SETA Corp., July
-
Smith, C., Coyne, E., Youman, C., and Ganta, S. 1996. Market analysis report: NIST small business innovative research (SBIR) grant: Role based access control: Phase 2. A marketing survey of civil federal government organizations to determine the need for role-based access control security product, SETA Corp., July.
-
(1996)
A marketing survey of civil federal government organizations to determine the need for role-based access control security product
-
-
Smith, C.1
Coyne, E.2
Youman, C.3
Ganta, S.4
-
39
-
-
1242282117
-
Role-based application design and enforcement
-
S. Jajodia and C. E. Landwehr Eds. North-Holland
-
Thomsen, D. J. 1991. Role-based application design and enforcement. In Database Security, IV: Status and Prospects, S. Jajodia and C. E. Landwehr, Eds., North-Holland, 151-168.
-
(1991)
Database Security, IV: Status and Prospects
, pp. 151-168
-
-
Thomsen, D.J.1
-
40
-
-
77956772659
-
Requirements capabilities and functionalities of user-role based security for an object-oriented design model
-
S. Jajodia and C. E. Landwehr Eds. North-Holland
-
Ting, T. C., Demurjian, S. A., and Hu, M. Y. 1992. Requirements capabilities and functionalities of user-role based security for an object-oriented design model. In Database Security, IV: Status and Prospects, S. Jajodia and C. E. Landwehr, Eds., North-Holland, 275-296.
-
(1992)
Database Security, IV: Status and Prospects
, pp. 275-296
-
-
Ting, T.C.1
Demurjian, S.A.2
Hu, M.Y.3
|