Computer Science ›› 2008, Vol. 35 ›› Issue (3): 277-279.

Previous Articles     Next Articles

  

  • Online:2018-11-16 Published:2018-11-16

Abstract: Delegation is an important security policy, the basic idea is user give its own permissionto another user, then the delegated user use those permission to execute some tasks. The basic RBAC-delegation model RBDM0 and RDM2000 can't solve temporal constrain

Key words: Access control, Delegation authorization, RBAC, Timing constraint

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!