Author:
Gates Christopher,Li Ninghui,Xu Zenglin,Chari Suresh N.,Molloy Ian,Park Youngja
Publisher
Springer International Publishing
Reference23 articles.
1. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29(2), 38–47 (1996)
2. Bell, D.E., LaPadula, L.J.: Secure computer systems: Unified exposition and Multics interpretation. Technical Report ESD-TR-75-306, Mitre Corporation (March 1976)
3. Park, J., Sandhu, R.: Originator control in usage control. In: Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks 2002 (2002)
4. Horizontal integration: Broader access models for realizing information dominance, JASON Report JSR-04-132 (2004)
5. Salem, M., Hershkop, S., Stolfo, S.: A Survey of Insider Attack Detection Research. In: Insider Attack and Cyber Security, pp. 69–90 (2008)
Cited by
22 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献