- 1.E. Bertino, E. Ferrari, and V. Atluri. The specification and enforcement of authorization constraints in workflow management systems. A CM Transactions on Information System Security, 1(2), February 1999. Google ScholarDigital Library
- 2.F. Chen and R. Sandhu. Constraints for rolebased access control. In Proceedings of the 1st Workshop an Role-Based Access Control, 1995. Google ScholarDigital Library
- 3.D.F. Ferraiolo, J. F. Barkley, and D. R. Kuhn. A role based access control model and reference implementation within a corporate intranet. A CM Transactions on Information System Security, 2(1), February 1999. Google ScholarDigital Library
- 4.L. Giuri and P. Iglio. Role templates for content-based access control. In Proceedings of the Second A CM Role-Based Access Control Workshop, November 1997. Google ScholarDigital Library
- 5.M. A. Harrison, W. L. Ruzzo, and J. D. Ullman. Protection in operating systems. Communications of the A CM, 19(8):461-471, August 1976. Google ScholarDigital Library
- 6.T. Jaeger, T. Michailidis, and R. Rada. Access control in a virtual university. In Proceedings of the Fourth International Workshop on Enterprise Security, 1999. To appear. Google ScholarDigital Library
- 7.T. Jaeger, A. Prakash, J. Liedtke, and N. Islam. Flexible control of downloaded executable content. A CM Transactions on Information System Security, 2(2), May 1999. Google ScholarDigital Library
- 8.E. C. Lupu and M. Sloman. Reconciling rolebased management and role-based access control. In Proceedings of the Second A CM Role- Based Access Control Workshop, November 1997. Google ScholarDigital Library
- 9.R. S. Sandhu. The typed access control model. In Proceedings of IEEE Symposium on Security and Privacy, pages 122-136, 1992. Google ScholarDigital Library
- 10.R. S. Sandhu, V. Bhamidipati, and Q. Munawer. The ARBAC97 model for role-based administration of roles. A CM Transactions on Information System Security, 1 (2), February 1999. Google ScholarDigital Library
- 11.R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control: a multi-dimensional view. In Proceedings of the Tenth Computer Security Applications Conference, pages 54-62, 1994.Google ScholarCross Ref
- 12.R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, Februaxy 1996. Google ScholarDigital Library
- 13.D. F. Sterne, M. A. Branstad, B. S. Hubbard, B. A. Mayer, and D. M. Wolcott. An analysis of application specific security policies. In Proceedings of the 14th National Computer Security Conference, pages 25-36, 1991.Google Scholar
- 14.L. Synder. On the synthesis of protection systems. In Proceedings of the Sixth A CM Symposium on Operating System Principles, pages 141-150, November 1977. Google ScholarDigital Library
- 15.D. J. Thomsen. Role-based application design and enforcement. In Database Security, IV: Status and Prospects, pages 151-168, 1991.Google Scholar
Index Terms
- On the increasing importance of constraints
Recommendations
Solving CSP by Lagrangian method with importance of constraints
Intelligent information processing IIWe proposed a neural network called LPPH-CSP for solving constraint satisfaction problem (CSP). The LPPH-CSP is not trapped by any point which is not a solution of the CSP, and it can update all neurons simultaneously. In this paper, we propose two ...
On the Relative Importance of Duration Constraints
This paper uncovers an implicit assumption, and its implications, made in the process of maximizing yield or minimizing costs subject to the duration constraints. Using linear programming results, it is shown that this technique is sensible only if the ...
On tree-preserving constraints
The study of tractable subclasses of constraint satisfaction problems is a central topic in constraint solving. Tree convex constraints are extensions of the well-known row convex constraints. Just like the latter, every path-consistent tree convex ...
Comments