Author:
Sicuranza Mario,Esposito Angelo,Ciampi Mario
Publisher
Springer Science and Business Media LLC
Reference17 articles.
1. Bell DE, LaPadula LJ (1973) Secure Computer Systems: Mathematical Foundations and Model. In: Bedford MA (ed) The Mitre Corporation. Electronic Systems Division, Air Force Systems Command, Hanscom Field, Bedford, MA, p 01731
2. Bertino E, Bonatti P, Ferrari E (2000) TRBAC: a temporal role-based access control model. In: Proceedings of the ACM workshop on Role-based access control. ACM Press, New York, NY, USA, pp 21–30
3. Ferraiolo DF, Cugini J, Kuhn DR (1995) Role-Based Access Control (RBAC): Features and Motivations. In: Proceedings of the 11th Annual Computer Security Application Conference, New Orleans, LA, December 11–15 1995, pp 241–248
4. Ferreira A, Chadwick D, Farinha P, Correia R, Zao G, Chilro R, Antunes L (2009) How to Securely Break into RBAC: The BTG-RBAC Model. In: Computer Security Applications Conference, 2009. ACSAC ’09. Annual, pp 23–31, 7–11 Dec. 2009. doi: 10.1109/ACSAC.2009.12
5. Ficco M, Romano L (2011) A Generic Intrusion Detection and Diagnoser System Based on Complex Event Processing. In: Processing (CCP), 2011 First International Conference on Data Compression, Communications, 21–24 June 2011, pp 275–284. doi: 10.1109/CCP.2011.43
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献