Concepedia

Publication | Closed Access

How to do discretionary access control using roles

158

Citations

11

References

1998

Year

Abstract

Article How to do discretionary access control using roles Share on Authors: Ravi Sandhu Laboratory for Information Security Technology and Information and Software Engineering Department, George Mason University Laboratory for Information Security Technology and Information and Software Engineering Department, George Mason UniversityView Profile , Qamar Munawer Laboratory for Information Security Technology and Information and Software Engineering Department, George Mason University Laboratory for Information Security Technology and Information and Software Engineering Department, George Mason UniversityView Profile Authors Info & Claims RBAC '98: Proceedings of the third ACM workshop on Role-based access controlOctober 1998 Pages 47–54https://doi.org/10.1145/286884.286893Online:01 October 1998Publication History 86citation824DownloadsMetricsTotal Citations86Total Downloads824Last 12 Months70Last 6 weeks4 Get Citation AlertsNew Citation Alert added!This alert has been successfully added and will be sent to:You will be notified whenever a record that you have chosen has been cited.To manage your alert preferences, click on the button below.Manage my AlertsNew Citation Alert!Please log in to your account Save to BinderSave to BinderCreate a New BinderNameCancelCreateExport CitationPublisher SiteGet Access

References

YearCitations

Page 1