Task-Constrained RBAC Model and Its Privilege Redundancy Analysis
暂无分享,去创建一个
Li Ma | Min Wen | Yanjie Zhou
[1] Cai Jia-Yong,et al. implicit authorization analysis of role-based administrative model , 2009 .
[2] Vijayalakshmi Atluri,et al. Role-based Access Control , 1992 .
[3] Ravi S. Sandhu,et al. RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control" , 2007, IEEE Security & Privacy.
[4] Wouter Joosen,et al. Least privilege analysis in software architectures , 2011, Software & Systems Modeling.
[5] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[6] Cai Jia. Implicit Authorization Analysis of Role-Based Administrative Model , 2009 .
[7] Elisa Bertino,et al. A Critique of the ANSI Standard on Role-Based Access Control , 2007, IEEE Security & Privacy.
[8] Seog Park,et al. Task-role-based access control model , 2003, Inf. Syst..
[9] Hong Fan,et al. Task-Based Access Control Model , 2003 .
[10] Lijun Dong,et al. How to Find a Rigorous Set of Roles for Application of RBAC , 2012, J. Softw..
[11] Ravi Sandhu,et al. The ASCAA principles for next-generation role-based access control , 2008 .
[12] Deng Ji. Task-Based Access Control Model , 2003 .
[13] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.