Role hierarchies and constraints for lattice-based access controls
From MaRDI portal
Publication:5096411
DOI10.1007/3-540-61770-1_28zbMATH Open1493.68048OpenAlexW1559018605MaRDI QIDQ5096411FDOQ5096411
Authors: Ravi Sandhu
Publication date: 16 August 2022
Published in: Computer Security — ESORICS 96 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-61770-1_28
Recommendations
Cited In (15)
- Title not available (Why is that?)
- On Lattices in Access Control Models
- Spatial Context in Role-Based Access Control
- Information Security and Privacy
- Title not available (Why is that?)
- Some results on lattice involving generalized permuting tri-derivations
- Information Security and Cryptology
- Role delegation on multiple-attractor cellular automata based on pseudo-exhaustive bit patterns
- Some constructions of the join of fuzzy subgroups and certain lattices of fuzzy subgroups with sup property.
- Controlling access in tree hierarchies
- Title not available (Why is that?)
- Hierarchical role-based access control development
- Information Security and Cryptology - ICISC 2003
- On derivations of lattices
- The fixed set of a derivation in lattices
This page was built for publication: Role hierarchies and constraints for lattice-based access controls
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5096411)