Author:
Veloudis Simeon,Nissanke Nimal
Publisher
Oxford University Press (OUP)
Reference47 articles.
1. Bell D. E. and LaPadula L. J. (1976) Secure Computer Systems: Unified Exposition and Multics Interpretation. Technical Report MTR-2997. MITRE Corporation, Bedford, MA, USA.
2. Biba K. J. (1977) Integrity Considerations for Secure Computer Systems. Technical Report ESD-TR-76-372. MITRE Corporation, Bedford, MA, USA.
3. Clark D. D. and Wilson D. R. (1987) A Comparison of Commercial and Military Computer Security Policies. Proc. 1987 IEEE Symp. Security and Privacy, Oakland, CA, USA, April 27–29, pp. 184–194. IEEE Computer Society, Los Alamitos, CA, USA.
4. Role-based access control models;Sandhu;IEEE Comput.,1996
5. Proposed NIST standard for role-based access control
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献