Dynamic Enforcement of Separation-of-Duty Policies
暂无分享,去创建一个
[1] Salil P. Vadhan,et al. Computational Complexity , 2005, Encyclopedia of Cryptography and Security.
[2] Vijayalakshmi Atluri,et al. Role-based Access Control , 1992 .
[3] Jason Crampton,et al. Specifying and enforcing constraints in role-based access control , 2003, SACMAT '03.
[4] Ninghui Li,et al. On mutually-exclusive roles and separation of duty , 2004, CCS '04.
[5] Ravi Sandhu,et al. Transaction control expressions for separation of duties , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.
[6] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[7] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[8] Simon N. Foley. The specification and implementation of “commercial” security requirements including dynamic segregation of duties , 1997, CCS '97.
[9] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.