Author:
Kashmar Nadine,Adda Mehdi,Atieh Mirna,Ibrahim Hussein
Reference16 articles.
1. Hu, Vincent C, David F. Ferraiolo, and D Richard Kuhn. (2018) “Attribute-Based Access Control.” Norwood: Artech House
2. Ge, Xiaocheng, Fiona Polack, and Régine Laleau. (2004) “Secure databases: an analysis of Clark-Wilson model in a database environment.” International Conference on Advanced Information Systems Engineering.234-247. Springer, Berlin, Heidelberg
3. Ennahbaoui, Mohammed, and Said Elhajji. (2013) “Study of access control models.” Proceedings of the World Congress on Engineering. 2: 3-5
4. Role-based access control (RBAC) based in hospital management.;Boadu;Int. J. Softw. Eng. Knowl. Eng.,2014
5. Adding attributes to role-based access control.;Kuhn;Computer.,2010
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献