Information Technology Reference
In-Depth Information
Acknowledgments
Thanks to the project “Developpement de systemes informatiques par rane-
ment des contraintes securitaires” of the action “Securit´einformatique”for
partly financing our research.
References
1. Bertino, E., Bonatti, P., Ferrari, E.: TRBAC: a temporal role-based access control
model. ACM Transactions on Information and System Security 4 (2001) 65-104
2. Bishop, M.: Computer Security: Art and Science. Addison-Wesley (2003)
3. Ferraiolo, D., Barkley, J., Kuhn, D.: A role-based access control model and reference
implementation within a corporate intranet. ACM Transactions on Information
And System Security 2 (1999) 34-64
4. Ferraiolo, D., Kuhn, D., Chandramouli, R.: Role-Based Access Control. Artech
House (2003)
5. Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, D., Chandramouli, R.: Proposed
NIST standard for role-based access control. ACM Transactions on Information
And System Security 4 (2001) 224-274
6. Gal, A., Atluri, V.: An authorization model for temporal data. In: Proceedings of
the 7th ACM conference on Computer and Communications Security. ACM Press
(2000) 144-153
7. Harrison, M., Ruzzo, W.: Monotonic protection systems. In: Foundations of Secure
Computation. Academic Press (1978) 337-363
8. Harrison, M., Ruzzo, W., Ullman, J.: Protection in operating systems. Communi-
cations of the ACM 19 (1976) 461-471
9. Lampson, B.: Protection. Operating Systems Review 8 (1974) 18-24
10. Miller, D., Baldwin, R.: Access control by Boolean expression evaluation. In: Fifth
Annual Computer Security Conference. IEEE Computer Society Press (1990) 131-
139
11. Sandhu, R.: The typed access matrix model. In: 1992 IEEE Computer Society
Symposium on Research in Security and Privacy. IEEE Computer Society Press
(1992) 122-136
12. Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control mod-
els. Computer 29 (1996) 38-47
13. Sandhu, R., Ganta, S: On testing for absence of rights in access control models. In:
The Computer Security Foundations Workshop VI. IEEE Computer Society Press
(1993) 109-118
14. Soshi, M.: Safety analysis of the dynamic-typed access matrix model. In: Computer
Security — ESORICS 2000. Springer-Verlag, Lecture Notes in Computer Science
1895 (2000) 106-121
Search WWH ::




Custom Search