Role-Based Access Control Models
Computer
The NIST model for role-based access control: towards a unified standard
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
RBAC-MAS and SODA: Experimenting RBAC in AOSE
Engineering Societies in the Agents World IX
A UML profile for role-based access control
Proceedings of the 2nd international conference on Security of information and networks
Suggested improvements to the DoDAF for modeling architectural security
SpringSim '09 Proceedings of the 2009 Spring Simulation Multiconference
International Journal of Information and Computer Security
Implementation of web-based platform for IC design and project management
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
Modeling and evaluating information leakage caused by inferences in supply chains
Computers in Industry
Access control for semantic data federations in industrial product-lifecycle management
Computers in Industry
Journal of Network and Computer Applications
Hi-index | 0.00 |
As the authors of the original proposal for the role-based access control (RBAC) standard and developers of the models from which it derives, the authors respond here to Ninghui Li, Ji-Won Byun, and Elisa Bertino's critique, which also appears in this issue. This is an opportune time in the revision cycle to introduce proposals for changes to the standard.