Composing and combining policies under the policy machine
暂无分享,去创建一个
[1] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[2] K. J. Bma. Integrity considerations for secure computer systems , 1977 .
[3] Vijay Varadharajan,et al. Role-based access control and the access control matrix , 2001, OPSR.
[4] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[5] James P Anderson,et al. Computer Security Technology Planning Study , 1972 .
[6] Daniel F. Sterne,et al. A Domain and Type Enforcement UNIX Prototype , 1995, Comput. Syst..
[7] Ravi S. Sandhu,et al. Configuring role-based access control to enforce mandatory and discretionary access control policies , 2000, TSEC.
[8] Peter Loscocco,et al. Meeting Critical Security Objectives with Security-Enhanced Linux , 2001 .
[9] Sushil Jajodia,et al. Flexible support for multiple access control policies , 2001, TODS.
[10] D. Richard Kuhn,et al. A role-based access control model and reference implementation within a corporate intranet , 1999, TSEC.
[11] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.