{"title":"访问控制模型D-TBAC取决于任务执行的要求","authors":"Sergey Lapin","doi":"10.1145/2799979.2800034","DOIUrl":null,"url":null,"abstract":"This article describes the access control model D-TBAC which extends TBAC. The presented model takes into account the requirements for the tasks performance. Model elements, properties, and rules of conditions' transformation are defined formally","PeriodicalId":293190,"journal":{"name":"Proceedings of the 8th International Conference on Security of Information and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Access control model D-TBAC subject to the requirements to tasks' performing\",\"authors\":\"Sergey Lapin\",\"doi\":\"10.1145/2799979.2800034\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article describes the access control model D-TBAC which extends TBAC. The presented model takes into account the requirements for the tasks performance. Model elements, properties, and rules of conditions' transformation are defined formally\",\"PeriodicalId\":293190,\"journal\":{\"name\":\"Proceedings of the 8th International Conference on Security of Information and Networks\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-09-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 8th International Conference on Security of Information and Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2799979.2800034\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 8th International Conference on Security of Information and Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2799979.2800034","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Access control model D-TBAC subject to the requirements to tasks' performing
This article describes the access control model D-TBAC which extends TBAC. The presented model takes into account the requirements for the tasks performance. Model elements, properties, and rules of conditions' transformation are defined formally