Skip to main content

and
  1. Chapter

    Safety and Liveness for an RBAC/MAC Security Model

    Our role-based/mandatory access control (RBAC/MAC) security model and enforcement framework for inter-operating legacy, COTS, GOTS, databases, servers, etc., limits: who (user/user role) can invoke which metho...

    C. Phillips, S. Demurjian, T. C. Ting in Data and Applications Security XVII (2004)

  2. Chapter

    Role Delegation for a Resource-Based Security Model

    Corporations and government agencies rely on inter-operating legacy, COTs, databases, clients, servers, etc., with security addressed from different dimensions. One dimension is delegation, where an authorized...

    M. Liebrand, H. Ellis, C. Phillips in Research Directions in Data and Applicatio… (2003)