Author:
Rajpoot Qasim Mahmood,Jensen Christian Damsgaard,Krishnan Ram
Publisher
Springer International Publishing
Reference17 articles.
1. Al-Kahtani, M.A., Sandhu, R.: A model for attribute-based user-role assignment. In: Annual Computer Security Applications Conference, pp. 353–362. IEEE (2002)
2. Covington, M.J., Long, W., Srinivasan, S., Dev, A.K., Ahamad, M., Abowd, G.D.: Securing context-aware applications using environment roles. In: Symposium on Access Control Models and Technologies, pp. 10–20. ACM (2001)
3. Lecture Notes in Computer Science;JH Chae,2007
4. Lecture Notes in Computer Science;MJ Covington,2006
5. Coyne, E., Weil, T.R.: ABAC and RBAC: scalable, flexible, and auditable access management. IT Prof. 15(3), 14–16 (2013)
Cited by
28 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献