Author:
Hitchens M.,Varadharajan Vijay,Saunders G.
Publisher
Springer Berlin Heidelberg
Reference17 articles.
1. Barkley, J. & Cincotta, A.,’ Managing role/permission relationships using object access types’, Proceedings of the 3rd ACM workshop on Role-based access control, Fairfax, USA, 1998, pp. 73–80.
2. Damianou, N., Dulay, N., Lupu, E. & Sloman, M.,’ The Ponder Policy Specification Language’, Proceedings of International workshop on Policies for Distributed Systems and Networks, Bristol, UK, January, 2001, pp. 18–38.
3. Fabry, R.,’ Capability-Based Addressing’, Communications of the ACM, 17(7), July, 1974, pp. 403–412.
4. Faden. G.,’ RBAC in UNIX administration’, Proceedings of the 4th ACM workshop on role-based access control, Fairfax, USA, 1999, pp. 95–101.
5. Ferraiolo, D., and Kuhn, R.:’ Role based access controls’, Proceedings of the 15th NIST-NCSC National Computer Security Conference, Baltimore MD, USA, 1992, pp. 554–563.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献