Publisher
Springer Berlin Heidelberg
Reference24 articles.
1. Ahn, G.J.: Specification and Classification of Role-Based Authorization Policies. IEEE Computer Society, Los Alamitos (2003)
2. Belokosztolszki, A., Eyers, D., Moody, K.: Policy Contexts: Controlling Information Flow in Parameterised RBAC. IEEE Computer Society Press, Los Alamitos (2003)
3. Belsis, P., Gritzalis, S.: A scalable Security Architecture enabling coalition formation between autonomous domains. In: Proceedings of ISSPIT 2005, Athens, Greece (2005)
4. Bertino, E., Ferrari, E., Atluri, V.: The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Trans. Inf. Systems. Security 2(1), 65–104 (1999)
5. Bertino, E., Joshi, J., Bhatti, R., Ghafoor, A.: Access-Control Language for Multidomain Environments. IEEE Internet Computing 8(6), 40–50 (2004)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献