Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
8.9 References
Gollman, Dieter. Computer Security. New York: John Wiley & Sons, 2000.
“An Introduction to Role-based Access Control.” NIST/ITL Bulletin, December, 1995. http://csrc.nist.gov/rbac/NIST-ITL-RBAC-bulletin.html
Byers, Simon, Juliana Freire, and Cláudio Silva. “Efficient Acquisition of Web Data through Restricted Query Interfaces.” AT&T Labs-Research, http://www10.org/cdrom/posters/p1051/
“Differentiating Between Access Control Terms”. http://secinf.net/uplarticle/2/Access_Control_WP.pdf.
Panko, Raymond. R. Corporate Computer and Network Security. Upper Saddle River, NJ: Prentice-Hall, 2004.
Iris scan. http://ctl.ncsc.dni.us/biomet%20web/BMIris.html.
NASA World Wide Web Best Practices 2000–2001 Draft Version 2.0. http://nasa-wbp.larc.nasa.gov/devel/4.0/4_4.html.
“NASA World Wide Web Best Practices 2000–2001 Draft Version 2.0”. 8/20/2000. http://nasa-wbp.larc.nasa.gov/devel/4.0/4_4.html, 5/6/2003.
Kahan, Jose. “A Distributed Authorization Model for WWW.” May, 1995. http://www.isoc.org/HMP/PAPER/107/html/paper.html, 5/6/2003.
Bannan, Karen. “Watching You, Watching Me PCs are turning informant. Whose side are they on?” PC Magazine: July 1, 2002, http://www.pcmag.com/article2/0,4149,342208,00.asp)
Pipkin, Donald. Information Security: Protecting the Global Enterprise. Upper Saddle River, NJ: Prentice-Hall, 2000.
Rights and permissions
Copyright information
© 2005 Springer Science+Business Media, Inc.
About this chapter
Cite this chapter
(2005). Access Control and Authorization. In: Computer Network Security. Springer, Boston, MA. https://doi.org/10.1007/0-387-25228-2_8
Download citation
DOI: https://doi.org/10.1007/0-387-25228-2_8
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-20473-4
Online ISBN: 978-0-387-25228-5
eBook Packages: Computer ScienceComputer Science (R0)