Role-based access control models

Computer - Tập 29 Số 2 - Trang 38-47 - 1996
Ravi Sandhu1, Edward J. Coyne2, H.L. Feinstein2, Charles E. Youman2
1George Mason Univ., Fairfax, VA (USA)
2SETA Corporation

Tóm tắt

Từ khóa


Tài liệu tham khảo

ferraiolo, 1993, an examination of federal and commercial access control policy needs, Proc 14th NIST-NCSC Nat Conf Comput Security, 107

10.1016/0167-4048(94)90049-3

fernandez, 1995, user group structures in object-oriented database authorization, Database Security VIII Status and Prospects

ferraiolo, 1992, role-based access controls, Proc 15th NIST-NCSC Nat l Computer Security Conf, 554

jonscher, 1993, extending access controls with dutiesrealized by active mechanisms, Database Security VI Status and Prospects, 91

nyanchama, 1994, access rights administration in role-based security systems, Database Security VIII Status and Prospects, 37

hu, 1995, user-role based security in the adam object-oriented design and analyses environment, Database Security VIII Status and Prospects, 333

mohammed, 1994, design for dynamic user-role-based security, Computers & Security, 13, 661, 10.1016/0167-4048(94)90048-5

1996, Common Criteria for Information Technology Security Evaluation

10.1109/2.241422

10.1109/CSFW.1994.315946

10.1109/RISP.1992.213266

1992, Information TechnologyOpen Systems Interconnection-Systems Management Overview

1988, Glossary of Computer Security Terms

1985, Department of Defense Trusted Computer System Evaluation Criteria

moffett, 1991, delegation of authority, Integrated Network Management II, 595