Amanote Research
Register
Sign In
Use of Role Based Access Control for Security-Purpose Hypervisors
doi 10.1109/trustcom.2013.199
Full Text
Open PDF
Abstract
Available in
full text
Date
July 1, 2013
Authors
Manabu Hirano
David W Chadwick
Suguru Yamaguchi
Publisher
IEEE
Related search
Security Analysis for Temporal Role Based Access Control
Journal of Computer Security
Risk
Computer Networks
Hardware
Communications
Reliability
Safety
Architecture
Quality
Software
Purpose-Based Versus Flow-Based Access Control for Privacy
Journal of Computer Science
Computer Networks
Software
Artificial Intelligence
Communications
Security Analysis of Role-Based Access Control Through Program Verification
Rights Management for Role-Based Access Control
Role Hierarchies for Temporal Constraint Role-Based Access Control Model.
Journal of Computer Science and Cybernetics
A Modal Logic for Role-Based Access Control
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Role-Based Access Control Consistency Validation
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems
A Formal Model for Parameterized Role-Based Access Control