Authorization in the digital library: secure access to services across enterprise boundaries
- 23 December 2002
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. se 13, 110-119
- https://doi.org/10.1109/adl.1996.502521
Abstract
No abstract availableThis publication has 13 references indexed in Scilit:
- SFINKS: Secure Focused Information, News, and Knowledge SharingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Role-based access control: a multi-dimensional viewPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Using semantic values to facilitate interoperability among heterogeneous information systemsACM Transactions on Database Systems, 1994
- Multidomain securityComputers & Security, 1994
- Reasoning about naming systemsACM Transactions on Programming Languages and Systems, 1993
- The role of rolesComputers & Security, 1993
- Univers: An attribute-based name serverSoftware: Practice and Experience, 1990
- Naming and grouping privileges to simplify security management in large databasesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- Access control policies: Some unanswered questionsComputers & Security, 1989
- Factors Affecting Distributed System SecurityIEEE Transactions on Software Engineering, 1987