A model of OASIS role-based access control and its support for active security
- 1 May 2001
- conference paper
- Published by Association for Computing Machinery (ACM)
- p. 171-181
- https://doi.org/10.1145/373256.373294
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- Generic support for distributed applicationsComputer, 2000
- The uses of role hierarchies in access controlPublished by Association for Computing Machinery (ACM) ,1999
- Team-and-role-based organizational context and access control for cooperative hypermedia environmentsPublished by Association for Computing Machinery (ACM) ,1999
- The role graph model and conflict of interestACM Transactions on Information and System Security, 1999
- A role-based access control model and reference implementation within a corporate intranetACM Transactions on Information and System Security, 1999
- Control principles and role hierarchiesPublished by Association for Computing Machinery (ACM) ,1998
- Role activation hierarchiesPublished by Association for Computing Machinery (ACM) ,1998
- Towards a more complete model of rolePublished by Association for Computing Machinery (ACM) ,1998
- A flexible model supporting the specification and enforcement of role-based authorization in workflow management systemsPublished by Association for Computing Machinery (ACM) ,1997
- Role-based access control modelsComputer, 1996