A formal model for role-based access control with constraints

被引:21
|
作者
Giuri, L [1 ]
Iglio, P [1 ]
机构
[1] FDN UGO BORDONI,I-00142 ROME,ITALY
关键词
D O I
10.1109/CSFW.1996.503698
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页码:136 / 145
页数:10
相关论文
共 50 条
  • [1] A formal model for parameterized role-based access control
    Abdallah, AE
    Khayat, EJ
    [J]. FORMAL ASPECTS IN SECURITY AND TRUST, 2005, 173 : 233 - 246
  • [2] A formal model for Role-Based Access Control using graph transformation
    Koch, M
    Mancini, LV
    Parisi-Presicce, F
    [J]. COMPUTER SECURITY - ESORICS 2000, PROCEEDINGS, 2000, 1895 : 122 - 139
  • [3] Meta objects for access control: A formal model for role-based principals
    Riechmann, T
    Hauck, FJ
    [J]. NEW SECURITY PARADIGMS WOEKSHOP, PROCEEDINGS, 1999, : 30 - 38
  • [4] Mining constraints in role-based access control
    Ma, Xiaopu
    Li, Ruixuan
    Lu, Zhengding
    Wang, Wei
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 87 - 96
  • [5] On the formal analysis of a spatio-temporal role-based access control model
    Toahchoodee, Manachai
    Ray, Indrakshi
    [J]. DATA AND APPLICATIONS SECURITY XXII, 2008, 5094 : 17 - 32
  • [6] Toward Formal Verification of Role-Based Access Control Policies
    Jha, Somesh
    Li, Ninghui
    Tripunitara, Mahesh
    Wang, Qihua
    Winsborough, William H.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2008, 5 (04) : 242 - 255
  • [7] Role-based access control model for GIS
    Pan, Yuqing
    Sheng, Yehua
    Zhou, Jieyu
    [J]. GEOINFORMATICS 2007: GEOSPATIAL INFORMATION TECHNOLOGY AND APPLICATIONS, PTS 1 AND 2, 2007, 6754
  • [8] A Role-Based Workflow Access Control Model
    Zhang Wen-dong
    Zhang Kai-ji
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 1136 - 1139
  • [9] Combination of Duty and Historical Constraints in Role-Based Access Control
    Hosseini, Ali
    Azgomi, Mohammad Abdollahi
    [J]. 2009 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2009, : 156 - +
  • [10] Designing role-based access control using formal concept analysis
    Kumar, Ch. Aswani
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (03) : 373 - 383