Role Graph Security Management Model based on Lattice
Eun-Bok Choi, Ju-Gi Park, Jae-Hoon Kim, Journal of Internet Computing and Services, Vol. 7, No. 5, pp. 109-122, Oct. 2006
Full Text:
Keywords: MAC, Lattice, RBAC, Role Graph, access control
Abstract
Statistics
Show / Hide Statistics
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
|
Cite this article
[APA Style]
Choi, E., Park, J., & Kim, J. (2006). Role Graph Security Management Model based on Lattice. Journal of Internet Computing and Services, 7(5), 109-122.
[IEEE Style]
E. Choi, J. Park, J. Kim, "Role Graph Security Management Model based on Lattice," Journal of Internet Computing and Services, vol. 7, no. 5, pp. 109-122, 2006.
[ACM Style]
Eun-Bok Choi, Ju-Gi Park, and Jae-Hoon Kim. 2006. Role Graph Security Management Model based on Lattice. Journal of Internet Computing and Services, 7, 5, (2006), 109-122.

