The Set and Function Approach to Modeling Authorization in Distributed Systems
- 8 May 2001
- book chapter
- Published by Springer Nature
- p. 189-207
- https://doi.org/10.1007/3-540-45116-1_20
Abstract
No abstract availableKeywords
This publication has 7 references indexed in Scilit:
- The Chinese Wall security policyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Supporting multiple access control policies in database systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A logical language for expressing authorizationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Compliance checking in the PolicyMaker trust management systemPublished by Springer Nature ,1998
- A calculus for access control in distributed systemsACM Transactions on Programming Languages and Systems, 1993
- The representation of policies as system objectsPublished by Association for Computing Machinery (ACM) ,1991
- ProtectionACM SIGOPS Operating Systems Review, 1974