Author:
Pham Quan,Reid Jason,McCullagh Adrian,Dawson Edward
Subject
Law,General Computer Science
Reference32 articles.
1. Abrams MD, LaPadula LJ, Eggers KW, Olson IM. A generalized framework for access control: an informal description. In: Proceedings of the 13th National Computer Security, Washington, USA; 1990, pp. 13–143.
2. Atluri V, Warner J. Supporting conditional delegation in secure workflow management systems. In: Proceedings of the 10th ACM symposium on Access control models and technologies (SACMAT'05), Stockholm, Sweden; 2005, pp. 49-58.
3. Distributed access-rights management with delegation certificates;Aura,1999
4. Baldwin RW. Naming and grouping privileges to simplify security management in large databases. In: Proceedings IEEE Computer Society Symposium on Research in Security and Privacy; April 1990, pp. 184–194.
5. Barka E, Sandhu, R. Role-based delegation model – hierarchical roles (RBDM1). In: Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC'04); 2004, pp. 396–404.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献