Amanote Research

Amanote Research

    RegisterSign In

Role Hierarchies for Temporal Constraint Role-Based Access Control Model.

Journal of Computer Science and Cybernetics
doi 10.15625/1813-9663/21/3/1247
Full Text
Open PDF
Abstract

Available in full text

Date

July 10, 2012

Authors
Lê ThanhNguyễn Văn NgọcNguyễn Thúc Hải
Publisher

Publishing House for Science and Technology, Vietnam Academy of Science and Technology


Related search

Security Analysis for Temporal Role Based Access Control

Journal of Computer Security
RiskComputer NetworksHardwareCommunicationsReliabilitySafetyArchitectureQualitySoftware
2014English

A Secure, Constraint-Aware Role-Based Access Control Interoperation Framework

2011English

A Formal Model for Parameterized Role-Based Access Control

English

CRiBAC: Community-Centric Role Interaction Based Access Control Model

Computers and Security
LawComputer Science
2012English

Rights Management for Role-Based Access Control

2008English

Specifying Role-Based Access Constraints With Object Constraint Language

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2004English

A Modal Logic for Role-Based Access Control

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2005English

Role-Based Access Control Consistency Validation

2006English

Roc-Bac: Role and Context Based Access Control Model for the Healthcare Environment

2019English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy