Author:
He Qingfeng,Antón Annie I.
Subject
Computer Science Applications,Information Systems,Software
Reference50 articles.
1. D.F. Ferraiolo, D.R. Kuhn, R. Chandramouli, Role-Based Access Control, Artech House Computer Security Series, 2003.
2. P. Samarati, S. De Capitani di Vimercati, Access control: policies, models, and mechanisms, in: IFIP WG 1.7 International School on Foundations of Security Analysis and Design (FOSAD 2000), LNCS 2171, 2001, pp. 137–196.
3. G. Schimpf. Role-engineering critical success factors for enterprise security administration, in: Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC’00), 2000.
4. A. Schaad, J. Moffett, J. Jacob, The role-based access control system of a european bank: a case study and discussion, in: Proceedings of the 6th ACM Symposium on Access Control Models & Technologies (SACMAT’01), 2001, pp. 3–9.
5. Modelling access policies using roles in requirements engineering;Crook;Information and Software Technology,2003
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献