A Uniform Model for Authorization and Access Control in Enterprise Information Platform
暂无分享,去创建一个
[1] Gail-Joon Ahn,et al. The rcl 2000 language for specifying role-based authorization constraints , 2000 .
[2] Sabrina De Capitani di Vimercati,et al. A modular approach to composing access control policies , 2000, CCS.
[3] Victoria Ungureanu,et al. Unified Support for Heterogeneous Security Policies in Distributed Systems , 1998, USENIX Security Symposium.
[4] Shengli Wu,et al. Authorization and Access Control of Application Data in Workflow Systems , 2004, Journal of Intelligent Information Systems.
[5] Silvana Castano,et al. Managing Workflow Authorization Constraints through Active Database Technology , 2001, Inf. Syst. Frontiers.
[6] Simon S. Lam,et al. Authorizations in Distributed Systems: A New Approach , 1993, J. Comput. Secur..
[7] Sushil Jajodia,et al. An authorization model for a public key management service , 2001, TSEC.
[8] Elisa Bertino,et al. The specification and enforcement of authorization constraints in workflow management systems , 1999, TSEC.
[9] Sushil Jajodia,et al. Flexible support for multiple access control policies , 2001, TODS.
[10] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[11] Elisa Bertino,et al. Administration Policies in a Multipolicy Autorization System , 1997, DBSec.
[12] Joan Feigenbaum,et al. Compliance Checking in the PolicyMaker Trust Management System , 1998, Financial Cryptography.