Engineering authority and trust in cyberspace
- 26 July 2000
- conference paper
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableThis publication has 12 references indexed in Scilit:
- Configuring role-based access control to enforce mandatory and discretionary access control policiesACM Transactions on Information and System Security, 2000
- The ARBAC97 model for role-based administration of rolesACM Transactions on Information and System Security, 1999
- The role graph model and conflict of interestACM Transactions on Information and System Security, 1999
- A role-based access control model and reference implementation within a corporate intranetACM Transactions on Information and System Security, 1999
- Role activation hierarchiesPublished by Association for Computing Machinery (ACM) ,1998
- Decentralized user-role assignment for Web-based intranetsPublished by Association for Computing Machinery (ACM) ,1998
- How to do discretionary access control using rolesPublished by Association for Computing Machinery (ACM) ,1998
- Role-based access control modelsComputer, 1996
- Policy/mechanism separation in HydraPublished by Association for Computing Machinery (ACM) ,1975
- Protection and the control of information sharing in multicsCommunications of the ACM, 1974