Security Violation Detection for RBAC Based Interoperation in Distributed Environment
暂无分享,去创建一个
Di Wu | Jianling Sun | Chao Huang | Xiaohu Yang | Xinyu Wang
[1] Sabrina De Capitani di Vimercati,et al. An algebra for composing access control policies , 2002, TSEC.
[2] Luigi V. Mancini,et al. A graph-based formalism for RBAC , 2002, TSEC.
[3] Elisa Bertino,et al. Secure interoperation in a multidomain environment employing RBAC policies , 2005, IEEE Transactions on Knowledge and Data Engineering.
[4] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[5] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[6] Roy H. Campbell,et al. IRBAC 2000: Secure Interoperability Using Dynamic Role Translation , 2000, International Conference on Internet Computing.
[7] Ravi S. Sandhu,et al. The NIST model for role-based access control: towards a unified standard , 2000, RBAC '00.
[8] Elisa Bertino,et al. Access-control language for multidomain environments , 2004, IEEE Internet Computing.
[9] Ravi S. Sandhu,et al. Role-Based Access Control , 1998, Adv. Comput..
[10] Li Gong,et al. Computational Issues in Secure Interoperation , 1996, IEEE Trans. Software Eng..
[11] Naftaly H. Minsky,et al. Flexible Regulation of Distributed Coalitions , 2003, ESORICS.
[12] Pierangela Samarati,et al. Providing Security and Interoperation of Heterogeneous Systems , 2004, Distributed and Parallel Databases.
[13] Ravi S. Sandhu,et al. Configuring role-based access control to enforce mandatory and discretionary access control policies , 2000, TSEC.
[14] Walid G. Aref,et al. Digital government security infrastructure design challenges , 2001 .