Role-Based Access Control Models
Computer
A Modular Covert Channel Analysis Methodology for Trusted DG/UX/sup TM/
ACSAC '96 Proceedings of the 12th Annual Computer Security Applications Conference
Role based access control on MLS systems without kernel changes
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
A framework for implementing role-based access control using CORBA security service
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Analysis of ANSI RBAC Support in COM+
Computer Standards & Interfaces
Hi-index | 0.00 |