Author:
Das Chowdhury Partha,Christianson Bruce,Malcolm James
Publisher
Springer Berlin Heidelberg
Reference7 articles.
1. Belokosztolszki, A.: Role based access control policy administration. Technical Report 586, University of Cambridge (2004)
2. Beresnevichiene, Y.: A role and context based security model. Technical Report 558, University of Cambridge (2003)
3. Diffie, W., Hellman, M.: New Directions In Cryptography. IEEE Transactions on Information Theory 22, 472–492 (1976)
4. Ferraiolo, D., Sandhu, R., Gavrilla, S., Kuhn, R., Chandramouli, R.: Proposed NIST Standard For Role Based Access Control. ACM Transactions on Information and Systems Security 4(3), 224–274
5. McKurley, K.: A Key Distribution System Equal to Factoring. Journal of Cryptology 1, 95–105 (1988)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Beyond Trust;Security Protocols XXII;2014
2. More Security or Less Insecurity;Security Protocols XVIII;2014