Access Control Coherence of Information Systems Based on Security Constraints
暂无分享,去创建一个
[1] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[2] Ivar Jacobson,et al. The Unified Modeling Language User Guide , 1998, J. Database Manag..
[3] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[4] Anneke Kleppe,et al. The object constraint language: precise modeling with UML , 1998 .
[5] Silvana Castano,et al. Database Security , 1997, IFIP Advances in Information and Communication Technology.
[6] Gail-Joon Ahn,et al. The RSL99 language for role-based separation of duty constraints , 1999, RBAC '99.
[7] Aneta Poniszewska-Maranda,et al. Role engineering of information system using extended RBAC model , 2005, 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05).
[8] Aneta Poniszewska-Maranda,et al. Verification of access control coherence in information system during modifications , 2003, WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003..
[9] Aneta Poniszewska-Maranda,et al. Representation of Extended RBAC Model Using UML Language , 2005, SOFSEM.
[10] Gail-Joon Ahn,et al. Role-based authorization constraints specification , 2000, TSEC.
[11] Gail-Joon Ahn,et al. The rcl 2000 language for specifying role-based authorization constraints , 2000 .