Author:
Cohen D.,Crampton J.,Gagarin A.,Gutin G.,Jones M.
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computational Theory and Mathematics,Control and Optimization,Discrete Mathematics and Combinatorics,Computer Science Applications
Reference25 articles.
1. American National Standards Institute (2004) ANSI INCITS 359–2004 for role based access control, ANSI, New York
2. Basin DA, Burri SJ, Karjoth G (2014) Obstruction-free authorization enforcement: aligning security and business objectives. J Comput Secur 22(5):661–698
3. Berend D, Tassa T (2010) Improved bounds on Bell numbers and on moments of sums of random variables. Probab Math Stat 30(2):185–205
4. Bertino E, Ferrari E, Atluri V (1999) The specification and enforcement of authorization constraints in workflow management systems. ACM Trans Inf Syst Secur 2(1):65–104
5. Chimani M, Klein K (2010) Algorithm engineering: concepts and practice. In: Bartz-Beielstein T, Chiarandini M, Paquete L, Preuss M (eds) Experimental methods for the analysis of optimization algorithms. Springer, Germany, pp 131–158
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献