Role-based security policy

被引:0
|
作者
Ma, Jianping
Yu, Xiangxuan
Hong, Fan
Zhang, Jiangling
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:447 / 450
相关论文
共 50 条
  • [41] A practical conflicting role-based cloud security risk evaluation method
    Han, Jin
    Zhan, Jing
    Xia, Xiaoqing
    Fan, Xue
    Zhan, Jing (zhanjing@bjut.edu.cn), 1600, Bentham Science Publishers (14): : 874 - 886
  • [42] Introducing Role-based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers
    Hirano, Manabu
    Shinagawa, Takahiro
    Eiraku, Hideki
    Hasegawa, Shoichi
    Omote, Kazumasa
    Tanimoto, Koichi
    Horie, Takashi
    Kato, Kazuhiko
    Okuda, Takeshi
    Kawai, Eiji
    Yamaguchi, Suguru
    2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 1225 - +
  • [43] Verification of dynamic Separation of Duty policy for role-based business processes
    Thipse, Aashay
    Hewett, Rattikorn
    2008 IEEE REGION 5 CONFERENCE, 2008, : 206 - 211
  • [44] Role-based policy to maintain privacy of patient health records in cloud
    Akshay Tembhare
    S. Sibi Chakkaravarthy
    D. Sangeetha
    V. Vaidehi
    M. Venkata Rathnam
    The Journal of Supercomputing, 2019, 75 : 5866 - 5881
  • [45] Analysis of role-based trust management policy using description logics
    Tang, S. (csshtang@scut.edu.cn), 2012, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (08):
  • [46] Role-based policy to maintain privacy of patient health records in cloud
    Tembhare, Akshay
    Chakkaravarthy, S. Sibi
    Sangeetha, D.
    Vaidehi, V.
    Rathnam, M. Venkata
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (09): : 5866 - 5881
  • [47] Configuring role-based access control to enforce Chinese Wall policy
    Zhao, QS
    Sun, YF
    COMPUTER SCIENCE AND TECHNOLOGY IN NEW CENTURY, 2001, : 206 - 209
  • [48] Policy Analysis for Self-administrated Role-Based Access Control
    Ferrara, Anna Lisa
    Madhusudan, P.
    Parlato, Gennaro
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, TACAS 2013, 2013, 7795 : 432 - 447
  • [49] Reasoning about security: A logic and a decision method for role-based access control
    Massacci, F
    QUALITATIVE AND QUANTITATIVE PRACTICAL REASONING, 1997, 1244 : 421 - 435
  • [50] Application of an Improved Role-Based Access Control Model in OBS Security Mechanism
    Jiang, Xueying
    Zhang, Chengjun
    Liu, Kean
    Li, Shiyao
    2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL II, 2010, : 555 - 558