2014 International Conference on Contemporary Computing and Informatics (IC3I) 2014
DOI: 10.1109/ic3i.2014.7019619
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Chinese wall access control using formal concept analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…Aswani Kumar [22] has proved that it is possible to design role hierarchy of RBAC using formal concept analysis. Extending upon this works , recently FCA has been used to model Chinese wall security policy [23]. Chen et al [24] have discussed how FCA can be used to capture RBAC constraints in d y namic computer environment.…”
Section: Introductionmentioning
confidence: 99%
“…Aswani Kumar [22] has proved that it is possible to design role hierarchy of RBAC using formal concept analysis. Extending upon this works , recently FCA has been used to model Chinese wall security policy [23]. Chen et al [24] have discussed how FCA can be used to capture RBAC constraints in d y namic computer environment.…”
Section: Introductionmentioning
confidence: 99%