Author:
Moon Chang-Joo,Park Dae-Ha,Park Soung-Jin,Baik Doo-Kwon
Subject
Law,General Computer Science
Reference17 articles.
1. Role-based authorization constraints specification;Ahn;ACM Trans Inf Syst Secur,2000
2. Ahn Gail-Joon, Shin Michael E. Role-based authorization constraints specification using object constraint language. Proceedings of Sixth IEEE International Workshop on Enterprise Security (WETICE 2001). MIT, MA; June 20–22, 2001.
3. Component-based product line engineering with UML;Atkinson,2002
4. The specification and enforcement of authorization constraints in workflow management systems;Bertino;ACM Trans Inf Syst Secur,1999
5. Ferraiolo David F, Gilbert Dennis M, Lynch Nickilyn. An examination of federal and commercial access control policy needs. In: NIST-NCSC National Computer Security Conference. Baltimore, MD; September 20–23, 1993. p. 107–16.
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献