Author:
Nassr Nezar,Aboudagga Nidal,Steegmans Eric
Publisher
Springer Berlin Heidelberg
Reference23 articles.
1. Ferraiolo, D., Kuhn, D.: Role-based access control. In: Proceedings of the 15th National Computer Security Conference (1992)
2. Crampton, J., Khambhammettu, H.: Delegation in role-based access control. Int. J. Inf. Sec. 7(2), 123–136 (2008)
3. Barka, E., Sandhu, R.: A Role-based Delegation Model and Some Extensions. In: Proceedings of 23rd National Information System Security Conference, Baltimore, pp. 101–114 (2000)
4. Lecture Notes in Computer Science;J. Crampton,2006
5. Zhang, L., Ahn, G., Chu, B.: A Rule-based framework for role-based delegation. In: Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT 2001), Chantilly, VA, pp. 153–162 (2001)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Secure and Flexible RBAC Scheme Using Mobile Agents;Lecture Notes in Electrical Engineering;2016
2. Mitigating conflicts of interest by authorization policies;Proceedings of the 8th International Conference on Security of Information and Networks;2015-09-08