Implementing Chinese wall policies on RBAC

被引:0
|
作者
School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China [1 ]
不详 [2 ]
机构
来源
Jisuanji Yanjiu yu Fazhan | 2007年 / 4卷 / 615-622期
关键词
D O I
10.1360/crad20070410
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] Implementing tobacco control policies
    Mackay, Judith
    BRITISH MEDICAL BULLETIN, 2012, 102 (01) : 5 - 16
  • [22] Health in All Policies: Seizing opportunities, implementing policies
    Lewis, Ray
    Feyzabadi, Vahid Yazdi
    INTERNATIONAL JOURNAL OF HEALTH POLICY AND MANAGEMENT, 2014, 2 (02): : 103 - 104
  • [23] Conformance Checking of RBAC Policies in Process-Aware Information Systems
    Baumgrass, Anne
    Baier, Thomas
    Mendling, Jan
    Strembeck, Mark
    BUSINESS PROCESS MANAGEMENT WORKSHOPS, PT II, 2012, 100 : 435 - +
  • [24] Automated Analysis of RBAC Policies with Temporal Constraints and Static Role Hierarchies
    Ranise, Silvio
    Anh Truong
    Vigano, Luca
    30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II, 2015, : 2177 - 2184
  • [25] A Risk Awareness Approach for Monitoring the Compliance of RBAC-based Policies
    Jaidi, Faouzi
    Ayachi, Faten Labbene
    2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, : 454 - 459
  • [26] On The Modeling. of Bell-LaPadula Security Policies Using RBAC
    Zhao, Gansen
    Chadwick, David W.
    17TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURES FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2008, : 257 - 262
  • [27] A Formal Approach for the Evaluation of Network Security Mechanisms Based on RBAC Policies
    Laborde, R.
    Nasser, B.
    Grasset, F.
    Barrere, F.
    Benzekri, A.
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 121 : 117 - 142
  • [28] Network security management:: A formal evaluation tool based on RBAC policies
    Laborde, R
    Nasser, B
    Grasset, F
    Barrère, F
    NETWORK CONTROL AND ENGINEERING FOR QOS, SECURITY AND MOBILITY, III, 2005, 165 : 69 - 80
  • [29] POSTER: ESPOONERBAC : Enforcing Security Policies in Outsourced Environments with Encrypted RBAC
    Asghar, Muhammad Rizwan
    Russello, Giovanni
    Crispo, Bruno
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 841 - 843
  • [30] RBAC policies in XML for X.509 based privilege management
    Chadwick, DW
    Otenko, A
    SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 39 - 53