Improved role based access control

被引:0
|
作者
Engineering and Research Center for Information Security Technology, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China [1 ]
不详 [2 ]
机构
来源
Jisuanji Gongcheng | 2006年 / 7卷 / 140-142+168期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] An improved Role-based workflow Access Control Model
    Zhao, Hui
    Fang, Zhiyi
    Xu, Peng
    Zhao, Lianyu
    Liu, Jin
    Wang, Tianyang
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 551 - 556
  • [2] An improved administration method on role-based access control in the enterprise environment
    Oh, S
    Park, S
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2001, 17 (06) : 921 - 944
  • [3] Role-Based Access Control and the Access Control Matrix
    Saunders, G.
    Hitchens, M.
    Varadharajan, V.
    2001, Association for Computing Machinery (35):
  • [4] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [5] Research and Implemention of File Protection System Based on Improved Role-Based Access Control
    Ke, Gang
    Ling, Jie
    Hao, Yanjun
    Liao, Hongqi
    Yang, Zhaoxia
    SECOND INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN, VOL 2, PROCEEDINGS, 2009, : 242 - +
  • [6] Application of an Improved Role-Based Access Control Model in OBS Security Mechanism
    Jiang, Xueying
    Zhang, Chengjun
    Liu, Kean
    Li, Shiyao
    2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL II, 2010, : 555 - 558
  • [7] Supporting relationships in access control using role based access control
    Barkley, J
    Beznosov, K
    Uppal, J
    FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 55 - 65
  • [8] Role-based access control
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [9] Role based access control models
    Sandhu, RS
    Coyne, EJ
    Feinstein, HL
    Youman, CE
    COMPUTER, 1996, 29 (02) : 38 - &
  • [10] Role delegation in role-based access control
    Na, SangYeob
    Cheon, SuhHyun
    Proceedings of the ACM Workshop on Role-Based Access Control, 2000, : 39 - 44