Specifying and enforcing constraints in role-based access control
暂无分享,去创建一个
[1] David F. Ferraiolo,et al. On the formal definition of separation-of-duty policies and their composition , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[2] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[3] Mary Ellen Zurko,et al. Separation of duty in role-based environments , 1997, Proceedings 10th Computer Security Foundations Workshop.
[4] Serban I. Gavrila,et al. Formal specification for role based access control user/role and role/role relationship management , 1998, RBAC '98.
[5] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[6] Sylvia L. Osborn,et al. The role graph model and conflict of interest , 1999, TSEC.
[7] Vipin Chaudhary,et al. History-based access control for mobile code , 1998, CCS '98.
[8] George Loizou,et al. On the structural complexity of con ict of interest policies , 2000 .
[9] Trent Jaeger,et al. Practical safety in flexible access control models , 2001, TSEC.
[10] Ravi Sandhu,et al. Transaction control expressions for separation of duties , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.
[11] Elisa Bertino,et al. The specification and enforcement of authorization constraints in workflow management systems , 1999, TSEC.
[12] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[13] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[14] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[15] Martín Abadi,et al. Access Control Based on Execution History , 2003, NDSS.
[16] Gail-Joon Ahn,et al. Role-based authorization constraints specification , 2000, TSEC.