Author:
Wimmer Martin,Kemper Alfons,Rits Maarten,Lotz Volkmar
Publisher
Springer Berlin Heidelberg
Reference17 articles.
1. Lecture Notes in Computer Science;M. Wimmer,2006
2. Bonatti, P., De Capitani di Vimercati, S., Samarati, P.: An Algebra for Composing Access Control Policies. ACM Transactions on Information and System Security (TISSEC) 5(1), 1–35 (2002)
3. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer 29(2), 38–47 (1996)
4. ANSI INCITS 359-2004, Role Based Access Control. American National Standards Institute, Inc. (ANSI), New York, NY, USA (February 2004)
5. Nadalin, A., et al.: Web Services Secure Conversation Language (WS-SecureConversation) (February 2005),
http://www-128.ibm.com/developerworks/library/specification/ws-secon/
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Classification-Based Anomaly Prediction in XACML Policies;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2023
2. A Systematic Mapping Study of Search-Based Software Engineering for Enterprise Application Integration;International Journal of Software Engineering and Knowledge Engineering;2022-02
3. Delegation of access rights in multi-domain service compositions;Identity in the Information Society;2009-12
4. An Approach to Identity Management for Service Centric Systems;Towards a Service-Based Internet;2008