I Own, I Provide, I Decide: Generalized User-Centric Access Control Framework for Web Applications
暂无分享,去创建一个
[1] Ravi S. Sandhu,et al. How to do discretionary access control using roles , 1998, RBAC '98.
[2] Frank Wm. Tompa,et al. User-Managed Access Control for Health Care Systems , 2005, Secure Data Management.
[3] Ninghui Li,et al. Resiliency Policies in Access Control , 2009, TSEC.
[4] Ninghui Li,et al. On safety in discretionary access control , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[5] Elisa Bertino,et al. Purpose based access control of complex data for privacy protection , 2005, SACMAT '05.
[6] Ravi S. Sandhu,et al. Lattice-based access control models , 1993, Computer.
[7] Andrew C. Simpson,et al. On the need for user-defined fine-grained access control policies for social networking applications , 2008, SOSOC '08.
[8] Alec Wolman,et al. Lockr: social access control for web 2.0 , 2008, WOSN '08.
[9] Messaoud Benantar,et al. Access Control Systems: Security, Identity Management and Trust Models , 2005 .
[10] Ninghui Li,et al. Administration in role-based access control , 2007, ASIACCS '07.
[11] Barbara Carminati,et al. Enforcing access control in Web-based social networks , 2009, TSEC.
[12] D. Richard Kuhn,et al. Role-Based Access Control ( RBAC ) : Features and Motivations , 2014 .
[13] Rob Johnson,et al. More Content - Less Control: Access Control in the Web 2.0 , 2006 .
[14] Elisa Bertino,et al. An Authorization Model for a Distributed Hypertext System , 1996, IEEE Trans. Knowl. Data Eng..
[15] Ye Du,et al. Configuring RBAC to Simulate Bell Model , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[16] Trent Jaeger,et al. Protecting users from "themselves" , 2007, CSAW '07.
[17] Ben Shneiderman,et al. Designing the User Interface: Strategies for Effective Human-Computer Interaction , 1998 .
[18] Jianping Fan,et al. A hierarchical access control model for video database systems , 2003, TOIS.
[19] David R. Kuhn,et al. Role-Based Access Control (RBAC): Features and Motivations | NIST , 1995 .
[20] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[21] Ravi S. Sandhu,et al. Configuring role-based access control to enforce mandatory and discretionary access control policies , 2000, TSEC.
[22] Elisa Bertino,et al. Access control enforcement for conversation-based web services , 2006, WWW '06.
[23] Sabrina De Capitani di Vimercati,et al. A fine-grained access control system for XML documents , 2002, TSEC.
[24] Ravi S. Sandhu,et al. ROBAC: Scalable Role and Organization Based Access Control Models , 2006, 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing.
[25] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.