Function-Based Authorization Constraints Specification and Enforcement
暂无分享,去创建一个
[1] Jason Crampton,et al. Specifying and enforcing constraints in role-based access control , 2003, SACMAT '03.
[2] Jean Bacon,et al. A model of OASIS role-based access control and its support for active security , 2002, ACM Trans. Inf. Syst. Secur..
[3] Jung Hee Cheon,et al. A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem , 2003, CRYPTO.
[4] Mary Ellen Zurko,et al. Separation of duty in role-based environments , 1997, Proceedings 10th Computer Security Foundations Workshop.
[5] Pietro Iglio,et al. A formal model for role-based access control with constraints , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[6] Sylvia L. Osborn,et al. Modeling users in role-based access control , 2000, RBAC '00.
[7] Elisa Bertino,et al. The specification and enforcement of authorization constraints in workflow management systems , 1999, TSEC.
[8] Patrick Dehornoy,et al. Entity authentication schemes using braid word reduction , 2006, Discret. Appl. Math..
[9] E. Artin. The theory of braids. , 1950, American scientist.
[10] Gail-Joon Ahn,et al. The rcl 2000 language for specifying role-based authorization constraints , 2000 .
[11] Jung Hee Cheon,et al. New Public-Key Cryptosystem Using Braid Groups , 2000, CRYPTO.
[12] Christoph Meinel,et al. A Framework for Cross-Institutional Authentication and Authorisation , 2005 .
[13] D. Goldfeld,et al. An algebraic method for public-key cryptography , 1999 .
[14] David F. Ferraiolo,et al. On the formal definition of separation-of-duty policies and their composition , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[15] Emil C. Lupu,et al. A policy based role object model , 1997, Proceedings First International Enterprise Distributed Object Computing Workshop.
[16] Elisa Bertino,et al. A unified framework for enforcing multiple access control policies , 1997, SIGMOD '97.
[17] Gail-Joon Ahn,et al. Role-based authorization constraints specification , 2000, TSEC.
[18] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[19] Sylvia L. Osborn,et al. The role graph model and conflict of interest , 1999, TSEC.
[20] Trent Jaeger,et al. Practical safety in flexible access control models , 2001, TSEC.
[21] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..