Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems

作者: D. Richard Kuhn

DOI: 10.1145/266741.266749

关键词:

摘要:

参考文章(7)
David D. Clark, W. E. Boebert, Paul Stachour, Thomas H. Hinke, Zella G. Ruthberg, National Computer Security Conference Proceedings (11th): A Postscript: Computer Security--Into the Future, 17-20 October 1988 ,(1988)
LouAnna Notargiacomo, Catherine D. McCollum, Barbara T. Blaustein, A Model of Integrity Separation of Duty for a Trusted DBMS Proceedings of the IFIP WG11.3 Working Conference on Database Security VII. pp. 237- 256 ,(1993)
D. J. Thomsen, Role-Based Application Design and Enforcement. DBSec. pp. 151- 168 ,(1990)
R.W. Baldwin, Naming and grouping privileges to simplify security management in large databases ieee symposium on security and privacy. pp. 116- 132 ,(1990) , 10.1109/RISP.1990.63844
R.S. Sandhu, E.J. Coyne, H.L. Feinstein, C.E. Youman, Role-based access control models IEEE Computer. ,vol. 29, pp. 38- 47 ,(1996) , 10.1109/2.485845
M.J. Nash, K.R. Poland, Some conundrums concerning separation of duty ieee symposium on security and privacy. pp. 201- 207 ,(1990) , 10.1109/RISP.1990.63851
David F. Ferraiolo, Janet A. Cugini, David R. Kuhn, Role-Based Access Control (RBAC): Features and Motivations | NIST annual computer security applications conference. pp. 241- 248 ,(1995)