Security policy management for systems employing role based access control model

被引:7
|
作者
Huang, Chao [1 ]
Sun, Jianling [1 ]
Wang, Xinyu [1 ]
Si, Yuanjie [1 ]
机构
[1] College of Computer Science, Zhejiang University, Zheda Road 38, Hangzhou, Zhejiang, 310027, China
关键词
D O I
10.3923/itj.2009.726.734
中图分类号
学科分类号
摘要
引用
收藏
页码:726 / 734
相关论文
共 50 条
  • [41] A Policy Based Access Control Model of PDM System
    Ye, C. X.
    Fu, Y. Q.
    ADVANCES IN MATERIALS MANUFACTURING SCIENCE AND TECHNOLOGY XIII, VOL 1: ADVANCED MANUFACTURING TECHNOLOGY AND EQUIPMENT, AND MANUFACTURING SYSTEMS AND AUTOMATION, 2009, 626-627 : 735 - +
  • [42] Access control coherence of information systems based on security constraints
    Poniszewska-Maranda, Aneta
    COMPUTER SAFETY, RELIABILTIY, AND SECURITY, PROCEEDINGS, 2006, 4166 : 412 - 425
  • [43] Research on Policy Domain Access Control Model in Distributed Systems
    Wu, Xian
    Qian, Peide
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 122 - +
  • [44] Improving Web Applications Security Using Path-Based Role Access Control Model
    Kononov, Dmitry
    Isaev, Sergey
    PROCEEDINGS OF THE 2018 3RD RUSSIAN-PACIFIC CONFERENCE ON COMPUTER TECHNOLOGY AND APPLICATIONS (RPC), 2018,
  • [45] An Access Control Model for Data Security in Online Social Networks Based on Role and User Credibility
    Voloch, Nadav
    Levy, Priel
    Elmakies, Mor
    Gudes, Ehud
    CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING, CSCML 2019, 2019, 11527 : 156 - 168
  • [46] Resource and Role Based Access Control Model
    Li, Xingdong
    Jin, Zhengping
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INDUSTRIAL INFORMATICS, 2015, 31 : 548 - 554
  • [47] Security analysis of access control model in hybrid cloud based on security entropy
    车天伟
    Ma Jianfeng
    Li Na
    Wang Chao
    HighTechnologyLetters, 2015, 21 (02) : 200 - 204
  • [48] Attributed Role Based Access Control Model
    Aftab, Muhammad Umar
    Habib, Muhammad Asif
    Mehmood, Nasir
    Aslam, Mubeen
    Irfan, Muhammad
    2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 83 - 89
  • [49] Semantic Role Based Access Control Model
    Semenova, N. A.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2012, 16 (02): : 50 - 64
  • [50] A role-based access control policy verification framework for real-time systems
    Shafiq, B
    Masood, A
    Joshi, J
    Ghafoor, A
    WORDS 2005: 10th IEEE International Workshop on Object-Oriented Real-Time Dependable, Proceedings, 2005, : 13 - 20