Specifying and enforcing the principle of least privilege in role‐based access control
暂无分享,去创建一个
Ruixuan Li | Jianfeng Lu | Meng Dong | Zhengding Lu | Xiaopu Ma | Zhengding Lu | Jianfeng Lu | Ruixuan Li | Xiaopu Ma | Meng Dong
[1] Ruixuan Li,et al. Request-driven role mapping framework for secure interoperation in multi-domain environments , 2008, Comput. Syst. Sci. Eng..
[2] Ninghui Li,et al. On mutually-exclusive roles and separation of duty , 2004, CCS '04.
[3] S. G. Ponnambalam,et al. Evolutionary Search Techniques to Solve Set Covering Problems , 2008 .
[4] K. Al-Sultan,et al. A Genetic Algorithm for the Set Covering Problem , 1996 .
[5] D. Richard Kuhn,et al. Role-Based Access Control ( RBAC ) : Features and Motivations , 2014 .
[6] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[7] Fred B. Schneider,et al. Least Privilege and More , 2003, IEEE Secur. Priv..
[8] Di Wu,et al. Security Violation Detection for RBAC Based Interoperation in Distributed Environment , 2008, IEICE Trans. Inf. Syst..
[9] D. Richard Kuhn,et al. Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems , 1997, RBAC '97.
[10] Christos Faloutsos,et al. Epidemic thresholds in real networks , 2008, TSEC.
[11] Ruixuan Li,et al. Role mining based on weights , 2010, SACMAT '10.
[12] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[13] Ruixuan Li,et al. Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments , 2007, ICISC.
[14] Vijayalakshmi Atluri,et al. The role mining problem: finding a minimal descriptive set of roles , 2007, SACMAT '07.
[15] Jason Crampton,et al. Inter-domain role mapping and least privilege , 2007, SACMAT '07.
[16] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[17] Pauli Miettinen,et al. The Discrete Basis Problem , 2008, IEEE Trans. Knowl. Data Eng..