Trust-Aware RBAC
- 1 January 2012
- conference paper
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableThis publication has 18 references indexed in Scilit:
- How to Securely Break into RBAC: The BTG-RBAC ModelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- STARBAC: Spatiotemporal Role Based Access ControlPublished by Springer Science and Business Media LLC ,2007
- GEO-RBACACM Transactions on Information and System Security, 2007
- TrustBACPublished by Association for Computing Machinery (ACM) ,2006
- How to Break Access Control in a Controlled MannerPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- LoT-RBAC: A Location and Time-Based RBAC ModelLecture Notes in Computer Science, 2005
- A trust-based context-aware access control model for Web-servicesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- The consensus operator for combining beliefsArtificial Intelligence, 2002
- Proposed NIST standard for role-based access controlACM Transactions on Information and System Security, 2001
- A LOGIC FOR UNCERTAIN PROBABILITIESInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2001