Dies ist eine Übersichtsseite mit Metadaten zu dieser wissenschaftlichen Arbeit. Der vollständige Artikel ist beim Verlag verfügbar.
Security Policies and Security Models
2.082
Zitationen
2
Autoren
1982
Jahr
Abstract
We assune that the reader is familiar with the ubiquity of information in the modern world and is sympathetic with the need for restricting rights to read, add, modify, or delete information in specific contexts. This need is particularly acute for systems having computers as significant components.
Ähnliche Arbeiten
Not So Different After All: A Cross-Discipline View Of Trust
1998 · 9.970 Zit.
Role-based access control models
1996 · 5.771 Zit.
The Eigentrust algorithm for reputation management in P2P networks
2003 · 3.341 Zit.
A survey of trust and reputation systems for online service provision
2005 · 3.279 Zit.
Proposed NIST standard for role-based access control
2001 · 2.507 Zit.