Implementing Chinese wall policies on RBAC

被引:0
|
作者
School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China [1 ]
不详 [2 ]
机构
来源
Jisuanji Yanjiu yu Fazhan | 2007年 / 4卷 / 615-622期
关键词
D O I
10.1360/crad20070410
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [11] Toward Implementing Spatio-Temporal RBAC Extensions
    Dubey, Aditya
    Ravi, Uttara
    Sharma, Somya
    Mitra, Barsha
    INFORMATION SYSTEMS SECURITY (ICISS 2019), 2019, 11952 : 59 - 78
  • [12] Implementing Chinese Wall Security Model for Cloud-based Services
    Basu, Srijita
    Sengupta, Anirban
    Mazumdar, Chandan
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1083 - 1089
  • [13] Mining Attribute-Based Access Control Policies from RBAC Policies
    Xu, Zhongyuan
    Stoller, Scott D.
    2013 10TH INTERNATIONAL CONFERENCE AND EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2013,
  • [14] Secure interoperation in a multidomain environment employing RBAC policies
    Shafiq, B
    Joshi, JBD
    Bertino, E
    Ghafoor, A
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2005, 17 (11) : 1557 - 1577
  • [15] A dynamic reconciliation service of RBAC policies for virtual organizations
    Sun, Weiqun
    Han, Yanbo
    Shani, Baohua
    ICEBE 2007: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2007, : 589 - 595
  • [16] Delegation model for CSCW based on RBAC policies and visual modeling
    Zhang, ZY
    Pu, JX
    Proceedings of the 11th Joint International Computer Conference, 2005, : 126 - 130
  • [17] Enforcing RBAC Policies over Data Stored on Untrusted Server
    Soltani, Naeimeh
    Bohlooli, Ramin
    Jalili, Rasool
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 10 (02): : 129 - 139
  • [18] Implementing Privacy Policies in the Cloud
    Caimi, Claudio
    D'Errico, Michela
    Gambardella, Carmela
    Manea, Mirko
    Wainwright, Nick
    CYBER SECURITY AND PRIVACY, CSP INNOVATION FORUM 2015, 2015, 530 : 3 - 13
  • [19] Effectively implementing biosecurity policies
    Gillum, David R.
    Moritz, Rebecca L.
    Schwartz, Antony
    SCIENCE, 2023, 380 (6642)
  • [20] Minimize liability by implementing policies
    Hall, JE
    WORKFORCE, 1999, 78 (11): : 64 - 65