Simulation of the Augmented Typed Access Matrix Model (ATAM) using Roles
暂无分享,去创建一个
[1] Ravi S. Sandhu,et al. Implementing transaction control expressions by checking for absence of access rights , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.
[2] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[3] R. Sandhu,et al. Access control: principles and practice , 1994, IEEE Commun. Mag..
[4] Jeffrey D. Ullman,et al. Protection in operating systems , 1976, CACM.
[5] Ravi S. Sandhu,et al. The schematic protection model: its definition and analysis for acyclic attenuating schemes , 1988, JACM.
[6] Sylvia L. Osborn,et al. Modeling Mandatory Access Control in Role-Based Security Systems , 1995, DBSec.
[7] Ravi S. Sandhu. The typed access matrix model , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[8] Ravi S. Sandhu,et al. How to do discretionary access control using roles , 1998, RBAC '98.
[9] Ravi S. Sandhu,et al. The Extended Schematic Protection Model , 1992, J. Comput. Secur..
[10] Ravi S. Sandhu,et al. Rationale for the RBAC96 family of access control models , 1996, RBAC '95.