Author:
Zhang Yue,Joshi James B. D.
Reference7 articles.
1. Atluri V, Gal A. An authorization model for temporal and derived data: securing information portals. ACM Trans Inf Syst Secur. 2002;5(1):62–94.
2. Bertino E, Bettini C, Ferrari E, Samarati P. An access control model supporting periodicity constraints and temporal reasoning. ACM Trans Database Syst. 1998;23(3):231–85.
3. Bertino E, Bonatti PA, Ferrari E. TRBAC: a temporal role-based access control model. ACM Trans Inf Syst Secur. 2001;4(3):191–233.
4. Fu S, Xu C.-Z. A coordinated spatio-temporal access control model for mobile computing in coalition environments. In: Proceeding of 19th IEEE International Parallel and Distributed Processing Symposium – Workshop 17; 2005. 18:289.2.
5. Joshi JBD, Bertino E, Latif U, Ghafoor A. A generalized temporal role-based access control model. IEEE Trans Knowl Data Eng. 2005;17(1):4–23.