Amanote Research

Amanote Research

    RegisterSign In

Use of Role Based Access Control for Security-Purpose Hypervisors

doi 10.1109/trustcom.2013.199
Full Text
Open PDF
Abstract

Available in full text

Date

July 1, 2013

Authors
Manabu HiranoDavid W ChadwickSuguru Yamaguchi
Publisher

IEEE


Related search

Security Analysis for Temporal Role Based Access Control

Journal of Computer Security
RiskComputer NetworksHardwareCommunicationsReliabilitySafetyArchitectureQualitySoftware
2014English

Purpose-Based Versus Flow-Based Access Control for Privacy

Journal of Computer Science
Computer NetworksSoftwareArtificial IntelligenceCommunications
2012English

Security Analysis of Role-Based Access Control Through Program Verification

2012English

Rights Management for Role-Based Access Control

2008English

Role Hierarchies for Temporal Constraint Role-Based Access Control Model.

Journal of Computer Science and Cybernetics
2012English

A Modal Logic for Role-Based Access Control

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2005English

Role-Based Access Control Consistency Validation

2006English

MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems

2008English

A Formal Model for Parameterized Role-Based Access Control

English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy