Extended RBAC Model with Task-Constraint Rules
暂无分享,去创建一个
Li Ma | Yanjie Zhou | Wei Duan
[1] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[2] Ravi Sandhu,et al. The ASCAA principles for next-generation role-based access control , 2008 .
[3] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[4] Deng Ji. Task-Based Access Control Model , 2003 .
[5] Seog Park,et al. Task-role-based access control model , 2003, Inf. Syst..
[6] Lijun Dong,et al. How to Find a Rigorous Set of Roles for Application of RBAC , 2012, J. Softw..
[7] Wouter Joosen,et al. Least privilege analysis in software architectures , 2011, Software & Systems Modeling.
[8] Cai Jia-Yong,et al. implicit authorization analysis of role-based administrative model , 2009 .
[9] Vijayalakshmi Atluri,et al. Role-based Access Control , 1992 .
[10] Wouter Joosen,et al. Automated Detection of Least Privilege Violations in Software Architectures , 2010, ECSA.