Role hierarchies and constraints for lattice-based access controls
From MaRDI portal
Publication:5096411
Recommendations
Cited in
(15)- scientific article; zbMATH DE number 1982664 (Why is no real title available?)
- On Lattices in Access Control Models
- Spatial Context in Role-Based Access Control
- Information Security and Privacy
- scientific article; zbMATH DE number 5622717 (Why is no real title available?)
- Some results on lattice involving generalized permuting tri-derivations
- Role delegation on multiple-attractor cellular automata based on pseudo-exhaustive bit patterns
- Information Security and Cryptology
- Some constructions of the join of fuzzy subgroups and certain lattices of fuzzy subgroups with sup property.
- Controlling access in tree hierarchies
- scientific article; zbMATH DE number 2173750 (Why is no real title available?)
- Hierarchical role-based access control development
- Information Security and Cryptology - ICISC 2003
- On derivations of lattices
- The fixed set of a derivation in lattices
This page was built for publication: Role hierarchies and constraints for lattice-based access controls
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5096411)