2008 Third International Conference on Risks and Security of Internet and Systems 2008
DOI: 10.1109/crisis.2008.4757460
|View full text |Cite
|
Sign up to set email alerts
|

Access control for cooperative systems: A comparative analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…Thus, several organizations belonging to a critical infrastructure collaborate [2], even if they are concurrent [3], in order to ensure continuity of CI. Each organization provides required resources, services and data to perform tasks.…”
Section: A Literature Reviewmentioning
confidence: 99%
“…Thus, several organizations belonging to a critical infrastructure collaborate [2], even if they are concurrent [3], in order to ensure continuity of CI. Each organization provides required resources, services and data to perform tasks.…”
Section: A Literature Reviewmentioning
confidence: 99%
“…Role-Based Access Control (RBAC) and Team-based Access Control (TMAC), an extension of RBAC, are techniques considered suitable for managing access in cooperative organizations [1,2]. RBAC was introduced in early multi-user computer systems [3,4].…”
Section: Introductionmentioning
confidence: 99%