Author:
Sun Yuqing,Gong Bin,Meng Xiangxu,Lin Zongkai,Bertino Elisa
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference23 articles.
1. R. Adaikkalavan, S. Chakravarthy, Active authorization rules for enforcing role-based access control and its extensions, in: Proceedings of the 21st International Conference on Data Engineering Workshops, ICDEW, 2005, p. 1197.
2. A content-based authorization model for digital libraries;Adam;IEEE Transactions on Knowledge and Data Engineering,2002
3. M.A. AI-Kahtani, R.S. Sandhu, A model for attribute-based user-role assignment, in: Proceedings of 18th Annual Computer Security Applications Conference, 2002, pp. 353–362.
4. M.A. AI-Kahtani, R. Sandhu, Induced role hierarchies with attribute-based RBAC, in: Proceeding of ACM SACMAT, Como Italy, 2003, pp. 142–148.
5. A model of OASIS role-based control and its support for active security;Bacon;ACM Transaction on Information and System Security (TISSEC),2002
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献