Security policy management for systems employing role based access control model

被引:7
|
作者
Huang, Chao [1 ]
Sun, Jianling [1 ]
Wang, Xinyu [1 ]
Si, Yuanjie [1 ]
机构
[1] College of Computer Science, Zhejiang University, Zheda Road 38, Hangzhou, Zhejiang, 310027, China
关键词
D O I
10.3923/itj.2009.726.734
中图分类号
学科分类号
摘要
引用
收藏
页码:726 / 734
相关论文
共 50 条
  • [1] A Spatio-Temporal Role-Based Access Control Model for Wireless LAN Security Policy Management
    Bera, P.
    Ghosh, S. K.
    Dasgupta, Pallab
    INFORMATION SYSTEMS, TECHNOLOGY AND MANAGEMENT, PROCEEDINGS, 2010, 54 : 76 - +
  • [2] A spatio-temporal role-based access control model for wireless LAN security policy management
    Bera P.
    Ghosh S.K.
    Dasgupta P.
    Communications in Computer and Information Science, 2010, 54 : 76 - 88
  • [3] Security Policy Integration based on Role-Based Access Control Model in Healthcare Collaborative Environments
    Kuang, Teo Poh
    Ibrahim, Hamidah
    PROCEEDINGS OF KNOWLEDGE MANAGEMENT 5TH INTERNATIONAL CONFERENCE 2010, 2010, : 553 - 559
  • [4] A role-based multilevel security access control model
    Pan, L
    Zhang, CN
    Yang, CG
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2006, 46 (03) : 1 - 10
  • [5] Access control model based on RDB security policy for OWL ontology
    Jeong, Dongwon
    Jing, Yixin
    Baik, Doo-Kwon
    COMPUTATIONAL SCIENCE - ICCS 2007, PT 2, PROCEEDINGS, 2007, 4488 : 720 - +
  • [6] Policy storage for role-based access control systems
    Belokosztolszki, A
    Eyers, DM
    Wang, W
    Moody, K
    TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 196 - 201
  • [7] A role based access control model for agent based control systems
    Drouineaud, M
    Lüder, A
    Sohr, K
    INDIN 2003: IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, PROCEEDINGS, 2003, : 307 - 311
  • [8] The application of security policy to role-based access control and the common data security architecture
    Lin, A
    Brown, R
    COMPUTER COMMUNICATIONS, 2000, 23 (17) : 1584 - 1593
  • [9] MRBAC: Hierarchical role management and security access control for distributed multimedia systems
    Zhao, Na
    Chen, Min
    Chen, Shu-Ching
    Shyu, Mei-Ling
    ISORC 2008: 11TH IEEE SYMPOSIUM ON OBJECT/COMPONENT/SERVICE-ORIENTED REAL-TIME DISTRIBUTED COMPUTING - PROCEEDINGS, 2008, : 76 - +
  • [10] Role Based Access Control in enterprise application - Security administration and user management
    Bindiganavale, Vinith
    Ouyang, Jinsong
    IRI 2006: PROCEEDINGS OF THE 2006 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION, 2006, : 111 - +