Role-based security policy

被引:0
|
作者
Ma, Jianping
Yu, Xiangxuan
Hong, Fan
Zhang, Jiangling
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:447 / 450
相关论文
共 50 条
  • [21] Role-based security for configurable distributed control systems
    Hauf, M
    Schwarz, J
    Polze, A
    SIXTH INTERNATIONAL WORKSHOP ON OBJECT-ORIENTED REAL-TIME DEPENDABLE SYSTEMS, PROCEEDINGS, 2001, : 111 - 118
  • [22] A spatio-temporal role-based access control model for wireless LAN security policy management
    Bera P.
    Ghosh S.K.
    Dasgupta P.
    Communications in Computer and Information Science, 2010, 54 : 76 - 88
  • [23] A Spatio-Temporal Role-Based Access Control Model for Wireless LAN Security Policy Management
    Bera, P.
    Ghosh, S. K.
    Dasgupta, Pallab
    INFORMATION SYSTEMS, TECHNOLOGY AND MANAGEMENT, PROCEEDINGS, 2010, 54 : 76 - +
  • [24] Policy storage for role-based access control systems
    Belokosztolszki, A
    Eyers, DM
    Wang, W
    Moody, K
    TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 196 - 201
  • [25] Policy analysis for Administrative Role-Based Access Control
    Sasturkar, Amit
    Yang, Ping
    Stoller, Scott D.
    Ramakrishnan, C. R.
    THEORETICAL COMPUTER SCIENCE, 2011, 412 (44) : 6208 - 6234
  • [26] Extended Role-Based Security System using Context Information
    Li, Xun
    Yoo, Sang Bong
    FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 503 - 508
  • [27] Role-Based Multiple Controllers for Load Balancing and Security in SDN
    Chourishi, Dharmendra
    Miri, Ali
    Milic, Mihailo
    Ismaeel, Salam
    2015 IEEE CANADA INTERNATIONAL HUMANITARIAN TECHNOLOGY CONFERENCE (IHTC2015), 2015,
  • [28] A Role-Based PMI Security Model for E-Government
    WU Li-jun
    Wuhan University Journal of Natural Sciences, 2005, (01) : 329 - 332
  • [29] A role-based process security model in business process management
    Kim, Kwanghoon
    Kim, Changmain
    Advances in Computational Methods in Sciences and Engineering 2005, Vols 4 A & 4 B, 2005, 4A-4B : 1596 - 1599
  • [30] Extensible and reusable role-based object-oriented security
    Demurjian, SA
    Ting, TC
    Price, M
    Hu, MY
    DATABASE SECURITY VOLUME X - STATUS AND PROSPECTS, 1997, : 288 - 307