Implementation of Access Control Model for Distributed Information Systems Using Usage Control
暂无分享,去创建一个
[1] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[2] Elisa Bertino,et al. A generalized temporal role-based access control model , 2005, IEEE Transactions on Knowledge and Data Engineering.
[3] Alexander Pretschner,et al. Distributed usage control , 2006, CACM.
[4] Yuanzhong Shu,et al. Research on an UCON model supporting distributed management , 2008, 2008 International Conference on Information and Automation.
[5] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[6] Elisa Bertino,et al. A Temporal Access Control Mechanism for Database Systems , 1996, IEEE Trans. Knowl. Data Eng..
[7] Aneta Poniszewska-Maranda,et al. Representation of Extended RBAC Model Using UML Language , 2005, SOFSEM.
[8] Ivar Jacobson,et al. The Unified Modeling Language User Guide , 1998, J. Database Manag..
[9] Aneta Poniszewska-Maranda. Access control models in heterogeneous information systems: From conception to exploitation , 2008, 2008 International Multiconference on Computer Science and Information Technology.
[10] Gail-Joon Ahn,et al. The rcl 2000 language for specifying role-based authorization constraints , 2000 .
[11] Aneta Poniszewska-Maranda,et al. Role engineering: From design to evolution of security schemes , 2008, J. Syst. Softw..
[12] Fabio Martinelli,et al. Usage control in computer security: A survey , 2010, Comput. Sci. Rev..
[13] Jaehong Park,et al. Attribute Mutability in Usage Control , 2004, DBSec.
[14] Jaehong Park,et al. Formal model and policy specification of usage control , 2005, TSEC.
[15] Silvana Castano,et al. Database Security , 1997, IFIP Advances in Information and Communication Technology.
[16] Vijayalakshmi Atluri,et al. An authorization model for temporal data , 2000, CCS.
[17] Vijayalakshmi Atluri,et al. An authorization model for temporal and derived data: securing information portals , 2002, TSEC.
[18] Peter Vojtáš. SOFSEM 2005: Theory and Practice of Computer Science, 31st Conference on Current Trends in Theory and Practice of Computer Science, Liptovský Ján, Slovakia, January 22-28, 2005, Proceedings , 2005, SOFSEM.
[19] Deborah Downs,et al. Issues in Discretionary Access Control , 1985, 1985 IEEE Symposium on Security and Privacy.
[20] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[21] P. Samarati,et al. Access control: principle and practice , 1994, IEEE Communications Magazine.
[22] Jaehong Park,et al. The UCONABC usage control model , 2004, TSEC.
[23] Gail-Joon Ahn,et al. Role-based authorization constraints specification , 2000, TSEC.
[24] Elisa Bertino,et al. TRBAC , 2001, ACM Trans. Inf. Syst. Secur..