Migrating to role-based access control
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Towards user-oriented RBAC model;Journal of Computer Security;2015-03-15
2. Authorization in cross-border eHealth systems;Information Systems Frontiers;2011-07-26
3. Role Engineering via Prioritized Subset Enumeration;IEEE Transactions on Dependable and Secure Computing;2010-07
4. The Role Mining Problem: A Formal Perspective;ACM T INFORM SYST SE;2010
5. The role mining problem;ACM Transactions on Information and System Security;2010-07