Administrative scope
- 1 May 2003
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Information and System Security
- Vol. 6 (2) , 201-231
- https://doi.org/10.1145/762476.762478
Abstract
No abstract availableKeywords
This publication has 8 references indexed in Scilit:
- A graph-based formalism for RBACACM Transactions on Information and System Security, 2002
- Designing data warehouses with OO conceptual modelsComputer, 2001
- Role-based authorization constraints specificationACM Transactions on Information and System Security, 2000
- Configuring role-based access control to enforce mandatory and discretionary access control policiesACM Transactions on Information and System Security, 2000
- The ARBAC97 model for role-based administration of rolesACM Transactions on Information and System Security, 1999
- The role graph model and conflict of interestACM Transactions on Information and System Security, 1999
- Role-based access control modelsComputer, 1996
- Protection in operating systemsCommunications of the ACM, 1976