A formal model for hierarchical policy contexts
暂无分享,去创建一个
[1] David M. Eyers,et al. Policy contexts: controlling information flow in parameterised RBAC , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.
[2] Andreas Schaad,et al. Observations on the role life-cycle in the context of enterprise security management , 2002, SACMAT '02.
[3] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[4] Ravi S. Sandhu,et al. The NIST model for role-based access control: towards a unified standard , 2000, RBAC '00.
[5] David W. Chadwick,et al. The PERMIS X.509 role based privilege management infrastructure , 2003, Future Gener. Comput. Syst..
[6] Emil C. Lupu,et al. The Ponder Policy Specification Language , 2001, POLICY.
[7] D B Baker,et al. PCASSO: a model for safe use of the Internet in healthcare. , 2000, Journal of AHIMA.
[8] Jeremy L. Jacob,et al. The role-based access control system of a European bank: a case study and discussion , 2001, SACMAT '01.
[9] Valérie Issarny,et al. Dealing with Multi-policy Security in Large Open Distributed Systems , 1998, ESORICS.
[10] Sylvia L. Osborn. Information flow analysis of an RBAC system , 2002, SACMAT '02.
[11] Jean Bacon,et al. A model of OASIS role-based access control and its support for active security , 2002, ACM Trans. Inf. Syst. Secur..
[12] András Belokosztolszki,et al. Role-based access control policy administration , 2004 .
[13] Pietro Iglio,et al. A formal model for role-based access control with constraints , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[14] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[15] David M. Eyers,et al. Shielding RBAC Infrastructures from Cyberterrorism , 2002, DBSec.
[16] Sylvia L. Osborn,et al. The role graph model and conflict of interest , 1999, TSEC.