Author:
Kumar Ravi,Sural Shamik,Gupta Arobinda
Publisher
Springer Berlin Heidelberg
Reference24 articles.
1. Coyne, E.J.: Role engineering. In: Proceedings of the 1st ACM Workshop on Role Based Access Control, USA, pp. 15–16 (1995)
2. Vanamali, S.: WHITE PAPER: Role engineering and RBAC, Role engineering: The cornerstone of role based access control. In: CISA, CISSP, pp. 1–3 (2008)
3. Vaidya, J., Atluri, V., Guo, Q.: The Role Mining Problem: Finding a minimal descriptive set of roles. In: The 12th ACM Symposium on Access Control Models and Technologies, France, pp. 175–184 (2007)
4. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role based access control models. IEEE Computer 29(2), 38–47 (1996)
5. Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-Based access control. ACM Transactions on Information and System Security 4(3), 224–274 (2001)
Cited by
27 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献