Secure collaboration based on RBAC in decentralized multi-domain environments
暂无分享,去创建一个
Kyu Il Kim | Ung Mo Kim | Won Young Kim | Joon Suk Ryu | U. Kim | Wonyoung Kim | Joonsuk Ryu | Kyu Il Kim
[1] Elisa Bertino,et al. SERAT: SEcure role mApping technique for decentralized secure interoperability , 2005, SACMAT '05.
[2] Elisa Bertino,et al. Secure interoperation in a multidomain environment employing RBAC policies , 2005, IEEE Transactions on Knowledge and Data Engineering.
[3] Ruixuan Li,et al. Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments , 2007, ICISC.
[4] Li Gong,et al. Computational Issues in Secure Interoperation , 1996, IEEE Trans. Software Eng..
[5] Angelos D. Keromytis,et al. Decentralized access control in distributed file systems , 2008, CSUR.
[6] Mao Bi,et al. Role based Access Control Model , 2003 .
[7] Elisa Bertino,et al. Database security - concepts, approaches, and challenges , 2005, IEEE Transactions on Dependable and Secure Computing.
[8] James B. D. Joshi,et al. An RBAC framework for time constrained secure interoperation in multi-domain environments , 2005, 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems.
[9] Jean Bacon,et al. Toward open, secure, widely distributed services , 2002, CACM.
[10] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[11] Elisa Bertino,et al. A Content-Based Authorization Model for Digital Libraries , 2002, IEEE Trans. Knowl. Data Eng..
[12] David J. DeWitt,et al. Limiting Disclosure in Hippocratic Databases , 2004, VLDB.
[13] Pierangela Samarati,et al. Providing Security and Interoperation of Heterogeneous Systems , 2004, Distributed and Parallel Databases.