Author:
Rajpoot Qasim Mahmood,Jensen Christian Damsgaard,Krishnan Ram
Publisher
Springer International Publishing
Reference23 articles.
1. Adam, N.R., Atluri, V., Bertino, E., Ferrari, E.: A content-based authorization model for digital libraries. IEEE Trans. Knowl. Data Eng. 14(2), 296–315 (2002)
2. Bertino, E., Moustafa A.H., Walid A.G., Elmagarmid, A.K.: An access control model for video database systems. In: International Conference on Information and Knowledge Management, pp. 336–343. ACM (2000)
3. Best Practices in Enterprise Authorization: The RBAC/ABAC Hybrid Approach (EmpowerID). http://blog.empowerid.com/Portals/174819/docs/EmpowerID-WhitePaper-RBAC-ABAC-Hybrid-Model.pdf
4. Covington, M.J., Long, W., Srinivasan, S., Dev, A.K., Ahamad, M., Abowd, G.D.: Securing context-aware applications using environment roles. In: Symposium on Access Control Models and Technologies, pp. 10–20. ACM (2001)
5. Lecture Notes in Computer Science;JH Chae,2007
Cited by
30 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Environment Aware Deep Learning Based Access Control Model;Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems;2024-06-19
2. A resilient inter-organizational workflow assignment plan selection approach: Application to a digital health use case;International Journal of Engineering Business Management;2024-01-04
3. Construction cost management using blockchain and encryption;Automation in Construction;2023-08
4. Duty-Based Workflow Dynamic Access Control Model;Lecture Notes in Computer Science;2023
5. The Model of Cross-Tenant Information Access Control in SAAS Cloud;2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT);2022-08