Author:
Chae Jung Hwa,Shiri Nematollaah
Publisher
Springer Berlin Heidelberg
Reference19 articles.
1. Sandhu, R.S., et al.: Role-based access control models. IEEE Computer 29(2), 38–47 (1996)
2. Ferraiolo, D.F., Barkely, J.F., Kuhn, D.R.: A role based access control model and reference implementation within a corporate Intranet. ACM Trans. Inf. Syst. Secur (USA) 1(2), 34–64 (1999)
3. Barkely, J.F., et al.: Role based access control for the world wide web. In: NIST 20th National Computer Security Conference, pp. 331–340 (1997)
4. Koch, M., Mancini, L.V., Parisi-Presicce, F.: A graph-based formalism for RBAC. ACM Trans. Inf. Syst. Secur (USA) 5(3), 332–365 (2002),
http://dx.doi.org/10.1145/545186.545191
5. Baader, F., et al.: The Description Logic Handbook: Theory, Implementation and Applications. Cambridge University Press, Cambridge (2003)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献