On the increasing importance of constraints
- 28 October 1999
- conference paper
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableThis publication has 11 references indexed in Scilit:
- Role-based access control: a multi-dimensional viewPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Flexible control of downloaded executable contentACM Transactions on Information and System Security, 1999
- The ARBAC97 model for role-based administration of rolesACM Transactions on Information and System Security, 1999
- The specification and enforcement of authorization constraints in workflow management systemsACM Transactions on Information and System Security, 1999
- A role-based access control model and reference implementation within a corporate intranetACM Transactions on Information and System Security, 1999
- Role templates for content-based access controlPublished by Association for Computing Machinery (ACM) ,1997
- Reconciling role based management and role based access controlPublished by Association for Computing Machinery (ACM) ,1997
- Role-based access control modelsComputer, 1996
- Constraints for role-based access controlPublished by Association for Computing Machinery (ACM) ,1996
- Protection in operating systemsCommunications of the ACM, 1976