Using RBAC to Enforce Solaris System Security
暂无分享,去创建一个
[1] Vijayalakshmi Atluri,et al. Role-based Access Control , 1992 .
[2] Ninghui Li,et al. On mutually-exclusive roles and separation of duty , 2004, CCS '04.
[3] Ravi S. Sandhu,et al. RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control" , 2007, IEEE Security & Privacy.
[4] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[5] Chang-Joo Moon,et al. Visual modeling and formal specification of constraints of RBAC using semantic web technology , 2007, Knowl. Based Syst..
[6] Ravi S. Sandhu,et al. The NIST model for role-based access control: towards a unified standard , 2000, RBAC '00.
[7] Ramaswamy Chandramouli,et al. Role-Based Access Control (2nd ed.) , 2007 .
[8] D. Richard Kuhn,et al. Role-Based Access Controls , 2009, ArXiv.
[9] Hong Chen,et al. Constraint generation for separation of duty , 2006, SACMAT '06.
[10] Brendan Gregg,et al. Solaris Performance and Tools: DTrace and MDB Techniques for Solaris 10 and OpenSolaris , 2006 .