The Incorporation of Control Principles into Access Control Policies
暂无分享,去创建一个
[1] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[2] Mary Ellen Zurko,et al. Separation of duty in role-based environments , 1997, Proceedings 10th Computer Security Foundations Workshop.
[3] David F. Ferraiolo,et al. On the formal definition of separation-of-duty policies and their composition , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[4] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[5] Sylvia L. Osborn,et al. The role graph model and conflict of interest , 1999, TSEC.
[6] Jonathan D. Moffett,et al. Control principles and role hierarchies , 1998, RBAC '98.
[7] D. Richard Kuhn,et al. Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems , 1997, RBAC '97.
[8] Michael J. Nash,et al. Some conundrums concerning separation of duty , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.