Publication | Closed Access
How to do discretionary access control using roles
158
Citations
11
References
1998
Year
Unknown Venue
EngineeringInformation SecurityCommunicationAuthentication Access ControlAuditingLogical Access ControlAccess ControlManagementRavi Sandhu LaboratorySecurity ManagementDiscretionary Access ControlData PrivacyInformation ManagementData SecurityInformation Security ManagementInformation Security TechnologySecurityTechnologyRegulationAuthorization Policies
Article How to do discretionary access control using roles Share on Authors: Ravi Sandhu Laboratory for Information Security Technology and Information and Software Engineering Department, George Mason University Laboratory for Information Security Technology and Information and Software Engineering Department, George Mason UniversityView Profile , Qamar Munawer Laboratory for Information Security Technology and Information and Software Engineering Department, George Mason University Laboratory for Information Security Technology and Information and Software Engineering Department, George Mason UniversityView Profile Authors Info & Claims RBAC '98: Proceedings of the third ACM workshop on Role-based access controlOctober 1998 Pages 47–54https://doi.org/10.1145/286884.286893Online:01 October 1998Publication History 86citation824DownloadsMetricsTotal Citations86Total Downloads824Last 12 Months70Last 6 weeks4 Get Citation AlertsNew Citation Alert added!This alert has been successfully added and will be sent to:You will be notified whenever a record that you have chosen has been cited.To manage your alert preferences, click on the button below.Manage my AlertsNew Citation Alert!Please log in to your account Save to BinderSave to BinderCreate a New BinderNameCancelCreateExport CitationPublisher SiteGet Access
| Year | Citations | |
|---|---|---|
Page 1
Page 1