Rollenmodelle für die Zugriffskontrolle in Unternehmen
暂无分享,去创建一个
[1] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[2] Andrew S. Tanenbaum. Moderne Betriebssysteme, 2. überarbeitete Auflage , 2002 .
[3] Andreas Rudolph,et al. Techniques of Cluster Algorithms in Data Mining , 2002, Data Mining and Knowledge Discovery.
[4] Ravi Sandhu,et al. The ASCAA principles for next-generation role-based access control , 2008 .
[5] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[6] A. Huther. Gesetz zur Kontrolle und Transparenz im Unternehmensbereich (KonTraG) , 2003 .
[7] Martin Kuhlmann,et al. Role mining - revealing business roles for security administration using data mining technology , 2003, SACMAT '03.
[8] Andreas Schaad,et al. Observations on the role life-cycle in the context of enterprise security management , 2002, SACMAT '02.
[9] Axel Kern,et al. Advanced features for enterprise-wide role-based access control , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[10] Christian Emig,et al. An Access Control Metamodel for Web Service-Oriented Architecture , 2007, International Conference on Software Engineering Advances (ICSEA 2007).
[11] Seunghun Jin,et al. A role‐based infrastructure management system: design and implementation , 2004, Concurr. Pract. Exp..
[12] Robert Winter,et al. Vorgehensmodelle für die rollenbasierte Autorisierung in heterogenen Systemlandschaften , 2007, Wirtschaftsinf..
[13] Seunghun Jin,et al. A role administration system in role-based authorization infrastructures: design and implementation , 2003, SAC '03.