Author:
Ahn Gail-Joon,Sandhu Ravi
Subject
Hardware and Architecture,Information Systems,Software
Reference14 articles.
1. The Design of the UNIX Operating System;Bach,1990
2. User group structures in object-oriented database authorization;Fernandez,1995
3. Ferraiolo, D., Barkley, J., 1997. Specifying and managing role-based access control within a corporate intranet. In: Proceedings of Second ACM Workshop on Role-Based Access Control. ACM, Fairfax, VA, 6–7 November, pp. 77–82
4. Grimes, R., 1997. Professional DCOM Programming. Wrox Press
5. User-role based security in the ADAM object-oriented design and analyses environment;Hu,1995
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Group-Based Discretionary Access Control in Health Related Repositories;Journal of Information Technology Research;2014-01
2. Analysis of ANSI RBAC Support in EJB;International Journal of Secure Software Engineering;2011-04
3. Analysis of ANSI RBAC Support in COM+;Computer Standards & Interfaces;2010-06
4. Effective Collaboration with Information Sharing in Virtual Universities;IEEE Transactions on Knowledge and Data Engineering;2009-06
5. Analysis of ANSI RBAC Support in EJB;Developing and Evaluating Security-Aware Software Systems