Author:
Crook Robert,Ince Darrel,Nuseibeh Bashar
Subject
Computer Science Applications,Information Systems,Software
Reference32 articles.
1. Strategies for Developing Policies and Requirements for Secure Electronic Commerce Systems;Antón,2001
2. E. Bertino, P.A. Bonatti, E. Ferrari, TRBAC: a temporal role-based access control model, Proceedings of the 5th ACM Workship on Role-based Access Control, July 2000, pp. 21–30.
3. Secure Computer Systems: a Mathematical Model;Bell,1973
4. J. Bacon, M. Lloyd, K. Moody, Translating Role-based Access Control within Context, Proceedings of International Workshop Policies for Distributed Systems and Networks (Policy 2001), Bristol, January 2001, LNCS, Springer-Verlag, pp. 107–119.
5. E. Barka, R. Sandhu, A framework for role based delegation model, Proceedings of 23rd National Information Systems Security Conference, Baltimore, October 16–19 2000, pp. 101–114.
Cited by
33 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Automatically Extracting Business Level Access Control Requirements from BPMN Models to Align RBAC Policies;Proceedings of the 7th International Conference on Information Systems Security and Privacy;2021
2. Coping with Access Control Requirements in the Context of Mutual Dependencies between Business and IT;Proceedings of the Central European Cybersecurity Conference 2018;2018-11-15
3. Start Here;Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies;2016-06-06
4. Design and Implementation of Multi Granularity Access Framework Based on AOP;Applied Mechanics and Materials;2014-09
5. Conviviality-driven access control policy;Requirements Engineering;2014-02-20