Author:
Aich Subhendu,Sural Shamik,Majumdar A. K.
Publisher
Springer Berlin Heidelberg
Reference16 articles.
1. Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Rolebased Access Control Models. IEEE Computer 29(2), 38–47 (1996)
2. Giuri, L.: Role -Based Access Control: A Natural Approach. In: RBAC. Proceedings of ACM Workshop on Role Based Access Control, pp. 33–37 (December 1996)
3. Covington, M.J., Moyer, M.J., Ahamad, M.: Generalized Role-based Access Control for Securing Future Applications. In: NISSC. Proceedings of National Information Systems Security Conference (October 2000)
4. Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST Standard for Role-based Access Control. ACM Transactions on Information and System Security (TISSEC) 4(3), 224–274 (2001)
5. Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A Temporal Role-Based Access Control Model. ACM Transactions on Information and System Security (TISSEC) 4(3), 191–223 (2001)
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. SoK: Context and Risk Aware Access Control for Zero Trust Systems;Security and Communication Networks;2022-06-30
2. Sensing Enabled Capabilities for Access Control Management;Internet of Things;2017-07-15
3. A Context-Aware System to Secure Enterprise Content;Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies;2016-06-06
4. Event-driven RBAC;Journal of Computer Security;2015-12-02
5. Mobile crowd-sensing context aware based fine-grained access control mode;Multimedia Tools and Applications;2015-05-31