An Access Control Model for NoSQL Databases
暂无分享,去创建一个
[1] Trent Jaeger,et al. Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999 , 1997, RBAC.
[2] Elisa Bertino,et al. Computer Security — ESORICS 96 , 1996, Lecture Notes in Computer Science.
[3] Gail-Joon Ahn,et al. Role-based authorization constraints specification , 2000, TSEC.
[4] D. Richard Kuhn,et al. Adding Attributes to Role-Based Access Control , 2010, Computer.
[5] Ravi S. Sandhu,et al. Role-Based Access Control , 1998, Adv. Comput..
[6] Ninghui Li,et al. On mutually-exclusive roles and separation of duty , 2004, CCS '04.
[7] Elisa Bertino,et al. A Trust-Based Context-Aware Access Control Model for Web-Services , 2004, Proceedings. IEEE International Conference on Web Services, 2004..
[8] Anand R. Tripathi,et al. Context-aware role-based access control in pervasive computing systems , 2008, SACMAT '08.
[9] Elisa Bertino,et al. TRBAC , 2001, ACM Trans. Inf. Syst. Secur..
[10] Neal Leavitt,et al. Will NoSQL Databases Live Up to Their Promise? , 2010, Computer.
[11] Indrakshi Ray,et al. LRBAC: A Location-Aware Role-Based Access Control Model , 2006, ICISS.
[12] Sihan Qing,et al. Information Security for Global Information Infrastructures , 2000, IFIP — The International Federation for Information Processing.
[13] Ravi S. Sandhu,et al. The authorization leap from rights to attributes: maturation or chaos? , 2012, SACMAT '12.
[14] Jan H. P. Eloff,et al. A Context-Sensitive Access Control Model and Prototype Implementation , 2000, SEC.
[15] D. Richard Kuhn,et al. A role-based access control model and reference implementation within a corporate intranet , 1999, TSEC.
[16] Ernesto Damiani,et al. Fine grained access control for SOAP E-services , 2001, WWW '01.
[17] Zora Konjovic,et al. Modeling context for access control systems , 2012, 2012 IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics.
[18] Xie Jun,et al. Context-Aware Role-Based Access Control Model for Web Services , 2004 .
[19] Dan Pritchett,et al. BASE: An Acid Alternative , 2008, ACM Queue.
[20] Computer Network Security , 2005 .
[21] Ravi S. Sandhu,et al. PBDM: a flexible delegation model in RBAC , 2003, SACMAT '03.
[22] Wenfei Fan,et al. Keys for XML , 2001, WWW '01.
[23] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[24] Sylvia L. Osborn,et al. The role graph model and conflict of interest , 1999, TSEC.
[25] Elisa Bertino,et al. TRBAC: a temporal role-based access control model , 2000, RBAC '00.
[26] D. Richard Kuhn,et al. Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems , 1997, RBAC '97.
[27] Xin Jin,et al. RABAC: Role-Centric Attribute-Based Access Control , 2012, MMM-ACNS.
[28] Ravi S. Sandhu. Role Hierarchies and Constraints for Lattice-Based Access Controls , 1996, ESORICS.
[29] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[30] Hong Fan,et al. A context-aware role-based access control model for Web services , 2005, IEEE International Conference on e-Business Engineering (ICEBE'05).
[31] Sylvia L. Osborn,et al. A role-based approach to access control for XML databases , 2004, SACMAT '04.
[32] Indrajit Ray,et al. TrustBAC: integrating trust relationships into the RBAC model for access control in open systems , 2006, SACMAT '06.
[33] Anind K. Dey,et al. Understanding and Using Context , 2001, Personal and Ubiquitous Computing.
[34] Murat Kantarcioglu,et al. Proceedings of the 17th ACM symposium on Access Control Models and Technologies , 2012, SACMAT 2012.