Separation of duty in role-based environments
- 22 November 2002
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 183-194
- https://doi.org/10.1109/csfw.1997.596811
Abstract
No abstract availableThis publication has 11 references indexed in Scilit:
- The Chinese Wall security policyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Transaction control expressions for separation of dutiesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Role-based access control: a multi-dimensional viewPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Conceptual foundations for a model of task-based authorizationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- User-centered securityPublished by Association for Computing Machinery (ACM) ,1996
- Policies and roles in collaborative applicationsPublished by Association for Computing Machinery (ACM) ,1996
- Naming and grouping privileges to simplify security management in large databasesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- Some conundrums concerning separation of dutyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- A Comparison of Commercial and Military Computer Security PoliciesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- Secure Computer System: Unified Exposition and Multics InterpretationPublished by Defense Technical Information Center (DTIC) ,1976