Author:
Bhatti Rafae,Bertino Elisa,Ghafoor Arif
Publisher
Kluwer Academic Publishers
Reference28 articles.
1. http://www.fas.org/irp/doddir/dod/d8320_2.pdf
2. http://www.educause.edu/ir/library/pdf/erm0348.pdf
3. S. D. C. di Vimercati, P. Samarati, “Access control in federated systems”, In proceedings of ACM New Security Paradigm Workshop, pages 87–99, Lake Arrowhead, CA, USA, 1996.
4. D. D. Clark, D. R. Wilson, “A comparison of commercial and military computer security policies,” In IEEE Symposium on Security and Privacy, pages 184–194, Oakland, April 1987.
5. R. S. Sandhu, E.J. Coyne, H.L. Feinstein, C.E. Youman, “Role-Based Access Control Models”, IEEE Computer 29(2): 38–47, IEEE Press, 1996.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献