Dies ist eine Übersichtsseite mit Metadaten zu dieser wissenschaftlichen Arbeit. Der vollständige Artikel ist beim Verlag verfügbar.
Security Policies and Security Models
2.077
Zitationen
2
Autoren
1982
Jahr
Abstract
We assune that the reader is familiar with the ubiquity of information in the modern world and is sympathetic with the need for restricting rights to read, add, modify, or delete information in specific contexts. This need is particularly acute for systems having computers as significant components.
Ähnliche Arbeiten
Not So Different After All: A Cross-Discipline View Of Trust
1998 · 9.937 Zit.
Role-based access control models
1996 · 5.762 Zit.
The Eigentrust algorithm for reputation management in P2P networks
2003 · 3.341 Zit.
A survey of trust and reputation systems for online service provision
2005 · 3.276 Zit.
Proposed NIST standard for role-based access control
2001 · 2.505 Zit.