Author:
Rashidi Ali Jabar,Rezakhani Afshin
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Software
Reference37 articles.
1. Rao UH (2014) Access controls. In: Brown K (ed) The InfoSec handbook: an introduction to information security. Apress, New York, United States, pp 63–76
2. Conrad E (2014) Domain 1: access control. In: Sciencedirect (Ed) Eleventh hour CISSP. ScienceDirect. Syngress, Rockland, Massachusetts, United States, pp 1–21
3. Department of Defense (1985) Trusted computer system evaluation criteria. United States Department of Defense (DOD), Virginia, United States
4. Li N (2011) Discretionary access control. In: Jajodia S, Van Tilborg HCA (eds) Encyclopedia of cryptography and security. Springer, New York, pp 353–356
5. Jafarian JH (2009) A dynamic mandatory access control model. In: Sarbazi-Azad H (ed) Advances in computer science and engineering. Springer, Berlin, pp 862–866
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献