Role-based security policy

被引:0
|
作者
Ma, Jianping
Yu, Xiangxuan
Hong, Fan
Zhang, Jiangling
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:447 / 450
相关论文
共 50 条
  • [31] Role-based PMI security model for E-government
    Wu, Li-Jun
    Su, Kai-Le
    Yang, Zhi-Hua
    Wuhan University Journal of Natural Sciences, 2005, 10 (01) : 329 - 332
  • [32] Role-Based Administration of Role-Based Smart Home IoT
    Shakarami, Mehrnoosh
    Sandhu, Ravi
    SAT-CPS'21: PROCEEDINGS OF THE 2021 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS, 2021, : 49 - 58
  • [33] Translating role-based access control policy within context
    Bacon, J
    Lloyd, M
    Moody, K
    POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2001, 1995 : 107 - 119
  • [34] Security Constraints in Temporal Role-Based Access-Controlled Workflows
    Combi, Carlo
    Vigano, Luca
    Zavatteri, Matteo
    CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, : 207 - 218
  • [35] Security Analysis of Role-Based Access Control through Program Verification
    Ferrara, Anna Lisa
    Madhusudan, P.
    Parlato, Gennaro
    2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 113 - 125
  • [36] Role-based Access Control for Memory Security on Network-on-Chips
    Chen, Song-Tao
    Xu, Lin-Fu
    Hang, Yan-Xi
    Li, Lun-wei
    2016 13TH IEEE INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT), 2016, : 1422 - 1424
  • [37] Hierarchical role-based viewing for multilevel information security in collaborative CAD
    Cera, CD
    Braude, I
    Kim, T
    Han, JH
    Regli, WC
    JOURNAL OF COMPUTING AND INFORMATION SCIENCE IN ENGINEERING, 2006, 6 (01) : 2 - 10
  • [39] Building and operating a software security awareness and role-based training program
    Merkow, Mark S., 2016, U.S. Department of Defense (29):
  • [40] Enabling role-based delegation and revocation on security-enhanced Linux
    Ahn, Gail-Joon
    Gami, Dhruv
    2007 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2007, : 700 - 705