Role-based access control: a multi-dimensional view
暂无分享,去创建一个
Ravi S. Sandhu | Edward J. Coyne | Charles E. Youman | Hal L. Feinstein | R. Sandhu | C. E. Youman | E. Coyne | H. Feinstein
[1] Frederick H. Lochovsky,et al. Role-Based Security in Data Base Management Systems , 1988, DBSec.
[2] James G. Williams,et al. Toward a universal integrity model , 1991, Proceedings Computer Security Foundations Workshop IV.
[3] T. C. Ting. A User-Role Based Data Security Approach , 1988, Database Security.
[4] Dan Thomsen,et al. Role-Based Application Design and Enforcement , 1990, Database Security.
[5] Ravi S. Sandhu,et al. Separation of Duties in Computerized Information Systems , 1990, DBSec.
[6] William T. Polk,et al. Security Issues in the Database Language SQL , 1993 .
[7] Ravi S. Sandhu,et al. A Three Tier Architecture for Role-Based Access Control , 1994 .
[8] Ravi S. Sandhu,et al. The NTree: a two dimension partial order for protection groups , 1988, TOCS.
[9] Ravi Sandhu,et al. Transaction control expressions for separation of duties , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.
[10] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[11] R.W. Baldwin,et al. Naming and grouping privileges to simplify security management in large databases , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[12] Teresa F. Lunt. Access control policies: Some unanswered questions , 1989, Comput. Secur..