GemRBAC-DSL: A High-level Specification Language for Role-based Access Control Policies
暂无分享,去创建一个
[1] Lionel C. Briand,et al. A Model-driven Approach to Representing and Checking RBAC Contextual Policies , 2016, CODASPY.
[2] Basit Shafiq,et al. A role-based access control policy verification framework for real-time systems , 2005, 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems.
[3] Elisa Bertino,et al. X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control , 2005, TSEC.
[4] Vijay Varadharajan,et al. Tower: A Language for Role Based Access Control , 2001, POLICY.
[5] Jason Crampton,et al. Delegation in role-based access control , 2007, International Journal of Information Security.
[6] Mark Strembeck,et al. Modeling process-related RBAC models with extended UML activity models , 2011, Inf. Softw. Technol..
[7] Jianguo Xiao,et al. An Extended Permission-Based Delegation Authorization Model , 2008, 2008 International Conference on Computer Science and Software Engineering.
[8] Manachai Toahchoodee,et al. A Spatio-temporal Role-Based Access Control Model , 2007, DBSec.
[9] Lionel C. Briand,et al. A comprehensive modeling framework for role-based access control policies , 2015, J. Syst. Softw..
[10] Nora Cuppens-Boulahia,et al. An extended RBAC profile of XACML , 2006, SWS '06.
[11] Gail-Joon Ahn,et al. Role-based authorization constraints specification using Object Constraint Language , 2001, Proceedings Tenth IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. WET ICE 2001.
[12] Elisa Bertino,et al. GEO-RBAC: a spatially aware RBAC , 2005, SACMAT '05.
[13] Elisa Bertino,et al. xfACL: an extensible functional language for access control , 2011, SACMAT '11.
[14] Elisa Bertino,et al. Supporting RBAC with XACML+OWL , 2009, SACMAT '09.
[15] Gail-Joon Ahn,et al. Specification and classification of role-based authorization policies , 2003, WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003..
[16] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[17] Elisa Bertino,et al. Access-control language for multidomain environments , 2004, IEEE Internet Computing.
[18] Gail-Joon Ahn,et al. Role-based authorization constraints specification , 2000, TSEC.
[19] Bhavani M. Thuraisingham,et al. ROWLBAC: representing role based access control in OWL , 2008, SACMAT '08.
[20] Elisa Bertino,et al. A generalized temporal role-based access control model , 2005, IEEE Transactions on Knowledge and Data Engineering.
[21] David A. Basin,et al. Analyzing First-Order Role Based Access Control , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.
[22] Martin Gogolla,et al. Comprehensive two-level analysis of role-based delegation and revocation policies with UML and OCL , 2012, Inf. Softw. Technol..
[23] Mary Ellen Zurko,et al. Separation of duty in role-based environments , 1997, Proceedings 10th Computer Security Foundations Workshop.
[24] Elisa Bertino,et al. TRBAC , 2001, ACM Trans. Inf. Syst. Secur..