scientific article; zbMATH DE number 2173750
From MaRDI portal
Publication:4680552
zbMATH Open1070.68015MaRDI QIDQ4680552FDOQ4680552
David F. Ferraiolo, D. Richard Kuhn, R. Chandramouli
Publication date: 3 June 2005
Title of this publication is not available (Why is that?)
Recommendations
Introductory exposition (textbooks, tutorial papers, etc.) pertaining to computer science (68-01) Computer system organization (68M99)
Cited In (19)
- Access Control Systems
- Title not available (Why is that?)
- Data flow analysis from capability lists, with application to RBAC
- Access Nets: Modeling Access to Physical Spaces
- Non-linear and non-group cellular automata chaining technique for cryptographic applications
- Delegation in Role-Based Access Control
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Securing the Web of Things with Role-Based Access Control
- Title not available (Why is that?)
- Role delegation on multiple-attractor cellular automata based on pseudo-exhaustive bit patterns
- Access Control in Data Management Systems
- Fuzzy role-based access control
- A theory of permission based on the notion of derogation
- Read-abortion (RA) based synchronization protocols to prevent illegal information flow
- A Typed Language for Events
- Multi-level Access Control, Directed Graphs and Partial Orders in Flow Control for Data Secrecy and Privacy
- Title not available (Why is that?)
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4680552)