A Purpose-Involved Role-Based Access Control Model
暂无分享,去创建一个
[1] Jun Gu,et al. Dynamic Purpose-Based Access Control , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications.
[2] M. Fragkakis,et al. Comparing the Trust and Security Models of Mobile Agents , 2007 .
[3] Ninghui Li,et al. Purpose based access control for privacy protection in relational database systems , 2008, The VLDB Journal.
[4] D. Richard Kuhn,et al. Adding Attributes to Role-Based Access Control , 2010, Computer.
[5] Jane Sinclair,et al. Introduction to formal specification and Z , 1991, Prentice Hall International Series in Computer Science.
[6] Jorge Lobo,et al. Privacy-Aware Role-Based Access Control , 2007, IEEE Security & Privacy.
[7] Elisa Bertino,et al. A role-involved purpose-based access control model , 2012, Inf. Syst. Frontiers.
[8] S. Swamynathan,et al. Purpose Based Access Control for Privacy Protection in Object Relational Database Systems , 2010, 2010 International Conference on Data Storage and Data Engineering.
[9] John Mylopoulos,et al. Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation , 2005, ESORICS.
[10] Ning Zhang,et al. A Purpose-Based Access Control Model , 2007 .
[11] Amirreza Masoumzadeh,et al. PuRBAC: Purpose-Aware Role-Based Access Control , 2008, OTM Conferences.
[12] Jorge Lobo,et al. Conditional Privacy-Aware Role Based Access Control , 2007, ESORICS.
[13] Elisa Bertino,et al. Privacy Protection , 2022 .
[14] Matthias Schunter,et al. Privacy promises, access control, and privacy management. Enforcing privacy throughout an enterprise by extending access control , 2002, Proceedings. Third International Symposium on Electronic Commerce,.
[15] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.