Author:
Rakkay Hind,Boucheneb Hanifa
Publisher
Springer Berlin Heidelberg
Reference49 articles.
1. Lecture Notes in Computer Science;P. Samarati,2001
2. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29(2), 38–47 (1996)
3. Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3), 224–274 (2001)
4. Barkley, J.F., Cincotta, A.V., Ferraiolo, D.F., Gavrila, S., Kuhn, D.R.: Role based access control for the world wide web. In: Proc. 20th NIST-NCSC National Information Systems Security Conference, pp. 331–340 (1997), http://citeseer.ist.psu.edu/101918.html
5. Jensen, K., Kristensen, L.M., Wells, L.: Coloured petri nets and CPN tools for modelling and validation of concurrent systems. STTT 9(3-4), 213–254 (2007)
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Role of Access Control in Information Security: A Security Analysis Approach;Information Security and Privacy in the Digital World - Some Selected Topics;2023-09-27
2. A Study Towards Exploring Access Control Mechanisms and its Limitations in Cloud Computing;VAWKUM Transactions on Computer Sciences;2023-06-05
3. Interaction detection in configurable systems – A formal approach featuring roles;Journal of Systems and Software;2023-02
4. From features to roles;Proceedings of the 24th ACM Conference on Systems and Software Product Line: Volume A - Volume A;2020-10-19
5. Access Control for Internet of Things Applications;Proceedings of the 5th on Cyber-Physical System Security Workshop - CPSS '19;2019