The uses of role hierarchies in access control
- 28 October 1999
- conference paper
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableThis publication has 5 references indexed in Scilit:
- Control principles and role hierarchiesPublished by Association for Computing Machinery (ACM) ,1998
- Reconciling role based management and role based access controlPublished by Association for Computing Machinery (ACM) ,1997
- Role based access control with the security administration manager (SAM)Published by Association for Computing Machinery (ACM) ,1997
- Role-based access control modelsComputer, 1996
- An authorization mechanism for a relational database systemACM Transactions on Database Systems, 1976