Using Role-Templates for Handling Recurring Role Structures
暂无分享,去创建一个
A Min Tjoa | Roland Wagner | Elisabeth Kapsammer | Wolfgang Eßmayr | A. Tjoa | R. Wagner | E. Kapsammer | W. Eßmayr
[1] Imtiaz Mohammed,et al. Design for dynamic user-role-based security , 1994, Comput. Secur..
[2] Sylvia L. Osborn,et al. Access Rights Administration in Role-Based Security Systems , 1994, DBSec.
[3] Zahir Tari,et al. A Role-Based Access Control for Intranet Security , 1997, IEEE Internet Comput..
[4] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[5] Brian Henderson-Sellers. OPEN Relationships - Compositions and Containments , 1997, J. Object Oriented Program..
[6] A Min Tjoa,et al. Access Controls by Object-Oriented Concepts , 1997, DBSec.
[7] Brian Henderson-Sellers,et al. OPEN Relationships - Associations, Mappings, Dependencies, and Uses , 1998, J. Object Oriented Program..
[8] A Min Tjoa,et al. The security architecture of IRO-DB , 1996, SEC.
[9] Ravi S. Sandhu,et al. The URA97 Model for Role-Based User-Role Assignment , 1997, DBSec.
[10] A Min Tjoa,et al. Authorization and access control in IRO-DB , 1996, Proceedings of the Twelfth International Conference on Data Engineering.
[11] Ravi S. Sandhu,et al. Role-based access control: a multi-dimensional view , 1994, Tenth Annual Computer Security Applications Conference.
[12] L. G. Lawrence. The role of roles , 1993, Comput. Secur..
[13] T. C. Ting,et al. Towards an authorization mechanism for user-role based security in an object-oriented design model , 1993, Proceedings of Phoenix Conference on Computers and Communications.
[14] Elisa Bertino,et al. Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control , 1996, VLDB.
[15] Ehud Gudes,et al. Alter-egos and Roles: Supporting Workflow Security in Cyberspaces , 1997, DBSec.
[16] Silvana Castano,et al. Database Security , 1997, IFIP Advances in Information and Communication Technology.
[17] Elisa Bertino,et al. A temporal authorization model , 1994, CCS '94.
[18] William E. Lorensen,et al. Object-Oriented Modeling and Design , 1991, TOOLS.
[19] Ravi S. Sandhu. Role Hierarchies and Constraints for Lattice-Based Access Controls , 1996, ESORICS.