Authorization management for role-based collaboration
暂无分享,去创建一个
Gail-Joon Ahn | Dongwan Shin | Bill Chu | Longhua Zhang | Bill Chu | Gail-Joon Ahn | Dongwan Shin | Longhua Zhang
[1] Roshan K. Thomas,et al. Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments , 1997, RBAC '97.
[2] X Itu,et al. Information technology-open systems interconnection-the directory: Public-key and attribute certific , 2000 .
[3] Sangrae Cho,et al. ROLE-BASED EAM USING X.509 ATTRIBUTE CERTIFICATE∗ , 2003 .
[4] Ross J. Anderson,et al. A security policy model for clinical information systems , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[5] D. Richard Kuhn,et al. A role-based access control model and reference implementation within a corporate intranet , 1999, TSEC.
[6] Edward J. Coyne. Role engineering , 1996, RBAC '95.
[7] Sushil Jajodia,et al. Revocations - A classification , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[8] Ravi S. Sandhu,et al. Framework for role-based delegation models , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[9] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[10] Gail-Joon Ahn,et al. A rule-based framework for role based delegation , 2001, SACMAT '01.
[11] G Potamias,et al. Role-based access to patients clinical data: the InterCare approach in the region of Crete. , 2000, Studies in health technology and informatics.
[12] Gail-Joon Ahn,et al. Injecting RBAC to secure a Web-based workflow system , 2000, RBAC '00.