Realizing MAC in role-based security system

被引:0
|
作者
Li, L.X.
Cao, J.K.
Chen, W.M.
Huang, S.L.
机构
来源
| 2001年 / Shenyang Institute of Computing Technology卷 / 22期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] The application of security policy to role-based access control and the common data security architecture
    Lin, A
    Brown, R
    COMPUTER COMMUNICATIONS, 2000, 23 (17) : 1584 - 1593
  • [32] Security Constraints in Temporal Role-Based Access-Controlled Workflows
    Combi, Carlo
    Vigano, Luca
    Zavatteri, Matteo
    CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, : 207 - 218
  • [33] Security Analysis of Role-Based Access Control through Program Verification
    Ferrara, Anna Lisa
    Madhusudan, P.
    Parlato, Gennaro
    2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 113 - 125
  • [34] Role-based Access Control for Memory Security on Network-on-Chips
    Chen, Song-Tao
    Xu, Lin-Fu
    Hang, Yan-Xi
    Li, Lun-wei
    2016 13TH IEEE INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT), 2016, : 1422 - 1424
  • [35] Hierarchical role-based viewing for multilevel information security in collaborative CAD
    Cera, CD
    Braude, I
    Kim, T
    Han, JH
    Regli, WC
    JOURNAL OF COMPUTING AND INFORMATION SCIENCE IN ENGINEERING, 2006, 6 (01) : 2 - 10
  • [37] Building and operating a software security awareness and role-based training program
    Merkow, Mark S., 2016, U.S. Department of Defense (29):
  • [38] A Search Engine System Based On Role-Based Access Control
    Cheng, Ning
    Zhao, Li
    Ma, Xiaopu
    Lan, Yihua
    Chen, Yi
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND INFORMATION SCIENCES (ICCIS 2014), 2014, : 1128 - 1137
  • [39] Enabling role-based delegation and revocation on security-enhanced Linux
    Ahn, Gail-Joon
    Gami, Dhruv
    2007 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2007, : 700 - 705
  • [40] A practical conflicting role-based cloud security risk evaluation method
    Han, Jin
    Zhan, Jing
    Xia, Xiaoqing
    Fan, Xue
    Zhan, Jing (zhanjing@bjut.edu.cn), 1600, Bentham Science Publishers (14): : 874 - 886