Role-Based Access Control (RBAC): Features and Motivations | NIST
暂无分享,去创建一个
[1] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[2] Imtiaz Mohammed,et al. Design for dynamic user-role-based security , 1994, Comput. Secur..
[3] Sebastiaan H. von Solms,et al. The management of computer security profiles using a role-oriented approach , 1994, Comput. Secur..
[4] David F. Ferraiolo,et al. An Examination of Federal and Commercial Access Control Policy Needs , 1993 .
[5] John M. Boone,et al. INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD , 1991 .
[6] R.W. Baldwin,et al. Naming and grouping privileges to simplify security management in large databases , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[7] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[8] D. E. Bell,et al. Secure Computer Systems : Mathematical Foundations , 2022 .