Dies ist eine Übersichtsseite mit Metadaten zu dieser wissenschaftlichen Arbeit. Der vollständige Artikel ist beim Verlag verfügbar.
Security Policies and Security Models
2.090
Zitationen
2
Autoren
1982
Jahr
Abstract
We assune that the reader is familiar with the ubiquity of information in the modern world and is sympathetic with the need for restricting rights to read, add, modify, or delete information in specific contexts. This need is particularly acute for systems having computers as significant components.
Ähnliche Arbeiten
Not So Different After All: A Cross-Discipline View Of Trust
1998 · 10.001 Zit.
Role-based access control models
1996 · 5.786 Zit.
The Eigentrust algorithm for reputation management in P2P networks
2003 · 3.349 Zit.
A survey of trust and reputation systems for online service provision
2005 · 3.293 Zit.
Proposed NIST standard for role-based access control
2001 · 2.513 Zit.