Subject
Law,General Computer Science
Reference13 articles.
1. [BBF01] E. Bertino, P. Bonatti, and E. Ferrari. “TRBAC: A Temporal Role-based Access Control Model”, ACM Transactions on Information and Systems Security, Vol.4, No.3, August 2001.
2. [BFA99] E. Bertino, E. Ferrari, V. Atluri, “An Approach for the Specification and Enforcement of Authorization Constraints in Workflow Management Systems”, ACM Transactions on Information and Systems Security, Vol.1, No.2, pp.65-104, February 1999.
3. [CMA00] M. J. Covington, M. J. Moyer, and M. Ahamad. “Generalized Role-Based Access Control for Securing Future Applications”. In Proc. of the 2000 National Information Systems Security Conference, Baltimore, MD, October 2000.
4. [FKC03] D.Ferraiolo, D.R. Kuhn, and R.Chandramouli. Role-based Access Control. Artech House. 2003.
5. [LLN03] J.Longstaff, M.Lockyer, and J.Nicholas, “The Tees Confidentiality Model: an Authorisation Model for Identities and Roles”, ”, Proc. of 8th ACM Symposium on Access Control Models and Methodologies, Como (Italy), June 2-3, 2003, ACM Press.
Cited by
36 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献