Management Advantages of Object Classification in Role-Based Access Control (RBAC)
暂无分享,去创建一个
[1] David F. Ferraiolo,et al. Assessment of Access Control Systems , 2006 .
[2] Gerhard Schimpf,et al. Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization , 2000, RBAC '00.
[3] Ravi S. Sandhu,et al. Configuring role-based access control to enforce mandatory and discretionary access control policies , 2000, TSEC.
[4] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[5] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[6] Junghwa Chae. Towards Modal Logic Formalization of Role-Based Access Control with Object Classes , 2007, FORTE.
[7] 日本規格協会. 情報技術 : 情報セキュリティ管理実施基準 : 国際規格 : ISO/IEC 17799 = Information technology : code of practice for infromation security management : international standard : ISO/IEC 17799 , 2000 .
[8] D. Richard Kuhn,et al. A role-based access control model and reference implementation within a corporate intranet , 1999, TSEC.
[9] Jeremy L. Jacob,et al. The role-based access control system of a European bank: a case study and discussion , 2001, SACMAT '01.
[10] Sabrina De Capitani di Vimercati,et al. A fine-grained access control system for XML documents , 2002, TSEC.
[11] Roshan K. Thomas,et al. Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments , 1997, RBAC '97.
[12] David R. Kuhn,et al. Role-Based Access Control (RBAC): Features and Motivations | NIST , 1995 .
[13] 日本規格協会. 情報技術-セキュリティ技術-情報セキュリティマネジメントシステム-要求事項 : 国際規格ISO/IEC 27001 = Information technology-Security techniques-Information security management systems-Requirements : ISO/IEC 27001 , 2005 .
[14] Ravi S. Sandhu,et al. Induced role hierarchies with attribute-based RBAC , 2003, SACMAT '03.
[15] Mustaque Ahamad,et al. Generalized Role-Based Access Control for Securing Future Applications , 2000 .
[16] Pietro Iglio,et al. Role templates for content-based access control , 1997, RBAC '97.
[17] Arun Kumar,et al. Context sensitivity in role-based access control , 2002, OPSR.
[18] Adrian Baldwin,et al. Towards a more complete model of role , 1998, RBAC '98.
[19] Ernesto Damiani,et al. Design and implementation of an access control processor for XML documents , 2000, Comput. Networks.
[20] Ravi S. Sandhu,et al. Role-based access control: a multi-dimensional view , 1994, Tenth Annual Computer Security Applications Conference.
[21] D. E. Bell,et al. Secure Computer Systems : Mathematical Foundations , 2022 .