Author:
Chinaei Amir H.,Tompa Frank Wm.
Publisher
Springer Berlin Heidelberg
Reference26 articles.
1. Al_Kahtani, M.A., Sandhu, R.: Induced Role Hierarchies with Attribute-Based RBAC. In: Proc. of the 8th ACM Symposium on Access Control Models and Technologies, June 2003, pp. 12–20 (2003)
2. Bell, D., LaPadula, L.: Secure Computer System: Unified Exposition and Multics Interpretation. Technical Report, ESD-TR-75-306, The MITRE Corp (March 1976)
3. Bertino, E., Jajodia, S., Samarati, P.: A Flexible Authorization for Relational Data Management Systems. ACM Transactions on Information Systems 17(2), 101–140 (1999)
4. Biba, K.J.: Integrity Considerations for Secure Computer Systems. Technical Report, ESD-TR-76-372, USAF Electronic Systems Division (April 1977)
5. Botha, R.A., Eloff, J.H.P.: Separation of Duties for Access Control Enforcement in Workflow Environments. IBM Systems Journal 40(3), 666–682 (2001)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献