Affiliation:
1. South China University of Technology
2. Shantou University
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Artificial Intelligence,Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Hardware and Architecture,Software
Reference14 articles.
1. [1] L. Fuchs and A. Preis, “BusiROLE: A model for integrating business roles into identity management,” Proc. 5th International Conference on Trust, Privacy and Security in Digital Business, Torino, Italy, pp.128-138, 2008.
2. [2] S. Fugkeaw, P. Manpanpanich, and S. Juntrapremjitt, “Exploiting X.509 certificate and multi-agent system architecture for role-based access control and authentication management,” CIT 2007, Fukushima, Japan, pp.733-748, 2007.
3. [3] D.F. Ferraiolo and R. Kuhn, “Role-based access control,” Proc. 15th National Computer Security Conference, Baltimore, MD, pp.554-563, 1992.
4. Role-based access control models
5. [5] N. Li, J.W. Byun, and E. Bertino, “A critique of the ANSI standard on role-based access control,” IEEE Security and Privacy, vol.5, no.6, pp.41-49, 2007.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献