Role-based security policy

被引:0
|
作者
Ma, Jianping
Yu, Xiangxuan
Hong, Fan
Zhang, Jiangling
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:447 / 450
相关论文
共 50 条
  • [1] An analysis of graphs that represent a role-based security policy hierarchy
    Belim, Sergey
    Bogachenko, Nadezda
    Ilushechkin, Evgeniy
    JOURNAL OF COMPUTER SECURITY, 2015, 23 (05) : 641 - 657
  • [2] ROLE-BASED NETWORK SECURITY
    JOLITZ, WF
    JOLITZ, LG
    DR DOBBS JOURNAL, 1995, 20 (05): : 80 - &
  • [3] The application of security policy to role-based access control and the common data security architecture
    Lin, A
    Brown, R
    COMPUTER COMMUNICATIONS, 2000, 23 (17) : 1584 - 1593
  • [4] Security Policy Integration based on Role-Based Access Control Model in Healthcare Collaborative Environments
    Kuang, Teo Poh
    Ibrahim, Hamidah
    PROCEEDINGS OF KNOWLEDGE MANAGEMENT 5TH INTERNATIONAL CONFERENCE 2010, 2010, : 553 - 559
  • [5] Role-Based Collaboration Model of Security Devices
    Liu Bing
    Song Cheng
    Xin Yang
    Yang Yixian
    Wang Shaobin
    Wei Jiwei
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4581 - +
  • [6] A role-based security architecture for business intelligence
    Megaache, S
    Karran, T
    Justo, GRR
    TECHNOLOGY OF OBJECT-ORIENTED LANGUAGES AND SYSTEMS - TOOLS 34, PROCEEDINGS, 2000, : 295 - 305
  • [7] Role-based signature and its security proof
    Lin, Changlu (cllin@fjnu.edu.cn), 1600, Institute of Information Science (32):
  • [8] Realizing MAC in role-based security system
    Li, L.X.
    Cao, J.K.
    Chen, W.M.
    Huang, S.L.
    2001, Shenyang Institute of Computing Technology (22):
  • [9] Security analysis in role-based access control
    Purdue University, West Lafayette, IN, United States
    不详
    不详
    不详
    ACM Trans. Inf. Syst. Secur., 2006, 4 (391-420):
  • [10] Role-based security for distributed object systems
    Yialelis, N
    Lupu, E
    Sloman, M
    PROCEEDINGS OF THE 5TH WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WET ICE '96), 1996, : 80 - 85