Role hierarchies and constraints for lattice-based access controls
From MaRDI portal
Publication:5096411
Recommendations
Cited in
(15)- On Lattices in Access Control Models
- Hierarchical role-based access control development
- On derivations of lattices
- Role delegation on multiple-attractor cellular automata based on pseudo-exhaustive bit patterns
- Spatial Context in Role-Based Access Control
- Controlling access in tree hierarchies
- scientific article; zbMATH DE number 5622717 (Why is no real title available?)
- Information Security and Cryptology
- scientific article; zbMATH DE number 1982664 (Why is no real title available?)
- The fixed set of a derivation in lattices
- Some constructions of the join of fuzzy subgroups and certain lattices of fuzzy subgroups with sup property.
- Some results on lattice involving generalized permuting tri-derivations
- Information Security and Privacy
- scientific article; zbMATH DE number 2173750 (Why is no real title available?)
- Information Security and Cryptology - ICISC 2003
This page was built for publication: Role hierarchies and constraints for lattice-based access controls
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5096411)