How to do discretionary access control using roles
- 1 October 1998
- proceedings article
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableKeywords
This publication has 7 references indexed in Scilit:
- Rationale for the RBAC96 family of access control modelsPublished by Association for Computing Machinery (ACM) ,1996
- Role-based access control modelsComputer, 1996
- Access control: principle and practiceIEEE Communications Magazine, 1994
- Lattice-based access control modelsComputer, 1993
- The schematic protection modelJournal of the ACM, 1988
- Protection in operating systemsCommunications of the ACM, 1976
- ProtectionACM SIGOPS Operating Systems Review, 1974