Attribute-based access control

作者: Vincent C Hu , D Richard Kuhn , David F Ferraiolo , Jeffrey Voas

DOI:

关键词:

摘要: … ) standard for role-based access control,4 and has become the basis for an increasing range of products. But beyond the basic scheme of associating attributes with subjects, objects, …

参考文章(12)
Anthony Nadalin, Heather Hinton, George Blakley, Birgit Pfitzmann, Method and system for attribute exchange in a heterogeneous federated environment ,(2002)
William R. Soley, Derk Norton, David L. Wood, Paul Weschler, Chris Ferris, Yvonne Wilson, Log-on service providing credential level change without loss of session continuity ,(2000)
Bradley Jeffery Behm, Gregory B. Roth, Authorized delegation of permissions ,(2015)
David Patron, Sreenivasa Rao Gorti, Javier B. Arellano, Paul VanVleck, Proxy-based profile management to deliver personalized services ,(2004)
Stuart A. Hoggan, Seetharama R. Durbha, Zero sign-on authentication ,(2012)
Alexander Phillip Amies, Christopher Michael Bauserman, Sadanand Rajaram Bajekal, Leanne L. Chen, Sridhar R. Muppidi, Managing user access entitlements to information technology resources ,(2007)
Terry M. Olkin, Rafiul Ahad, Padmanabha Vedam, Amar Padmanabha, Richard J. Hall, Eric S. Chan, User definable policy for graduated authentication based on the partial orderings of principals ,(2007)
Arun K. Nanda, Olga B. Ivanova, Lucas R. Melton, Sriram Sampath, Ashwin Palekar, Sergey A. Kuzin, Techniques for accessing desktop applications using federated identity ,(2009)