Improved role based access control

被引:0
|
作者
Engineering and Research Center for Information Security Technology, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China [1 ]
不详 [2 ]
机构
来源
Jisuanji Gongcheng | 2006年 / 7卷 / 140-142+168期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (02) : 123 - 136
  • [22] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +
  • [23] Tower: A language for role based access control
    Hitchens, M
    Varadharajan, V
    POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2001, 1995 : 88 - 106
  • [24] Migrating to role-based access control
    Brooks, K
    FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 71 - 81
  • [25] Study of Role-based Access Control
    Cao Yonghui
    EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5209 - 5212
  • [26] A role based access control for Web services
    Wonohoesodo, R
    Tari, Z
    2004 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, 2004, : 49 - 56
  • [27] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    COMPUTER, 2012, 45 (06) : 81 - 88
  • [28] Role based access control for UDDI inquiries
    Peterkin, Raymond
    Solomon, Jinsuk
    Ionescu, Dan
    2007 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS SOFTWARE & MIDDLEWARE, VOLS 1 AND 2, 2007, : 42 - +
  • [29] Role-based access control in DCOM
    Ahn, GJ
    JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
  • [30] Role based access control in the ATLAS experiment
    Leahu, Marius
    Dobson, Marc
    Avolio, Giuseppe
    2007 15TH IEEE-NPSS REAL-TIME CONFERENCE, VOLS 1 AND 2, 2007, : 60 - 65