ACCESS-CONTROL - PRINCIPLES AND PRACTICE

被引:580
作者
SANDHU, RS [1 ]
SAMARATI, P [1 ]
机构
[1] UNIV MILAN,I-20122 MILAN,ITALY
关键词
D O I
10.1109/35.312842
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
[No abstract available]
引用
收藏
页码:40 / 48
页数:9
相关论文
共 10 条
[1]  
BERTINO E, 1993, 1 ACM C COMP COMM SE, P130
[2]  
CASTANO S, 1994, DATABASE SECURITY
[3]   TRUSTED PRODUCTS EVALUATION [J].
CHOKHANI, S .
COMMUNICATIONS OF THE ACM, 1992, 35 (07) :64-76
[4]  
Ferraiolo D., 1992, 15 NIST NCSC NAT COM, P554
[5]  
FERRAIOLO DF, 1993, 6TH NIST NCSC NAT CO, P107
[6]  
NEUMAN BC, 1994, IEE COMMUNICATIO SEP
[7]  
SANDHU R, 1994, DATABASE SECURITY, V7
[8]   LATTICE-BASED ACCESS-CONTROL MODELS [J].
SANDHU, RS .
COMPUTER, 1993, 26 (11) :9-19
[9]  
SANDHU RS, 1994, UNPUB ROLE BAS ACC C
[10]   AUTHENTICATION FOR DISTRIBUTED SYSTEMS [J].
WOO, TYC ;
LAM, SS .
COMPUTER, 1992, 25 (01) :39-52