Role-based authorization constraints specification
Top Cited Papers
- 1 November 2000
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Information and System Security
- Vol. 3 (4) , 207-226
- https://doi.org/10.1145/382912.382913
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- A formal model for role-based access control with constraintsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Separation of duty in role-based environmentsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- The NIST model for role-based access controlPublished by Association for Computing Machinery (ACM) ,2000
- Configuring role-based access control to enforce mandatory and discretionary access control policiesACM Transactions on Information and System Security, 2000
- The RSL99 language for role-based separation of duty constraintsPublished by Association for Computing Machinery (ACM) ,1999
- On the increasing importance of constraintsPublished by Association for Computing Machinery (ACM) ,1999
- How to do discretionary access control using rolesPublished by Association for Computing Machinery (ACM) ,1998
- Role-based access control modelsComputer, 1996
- Lattice-based access control modelsComputer, 1993