Extending access control with duties—realized by active mechanisms
Results of the Sixth Working Conference of IFIP Working Group 11.3 on Database Security on Database security, VI : status and prospects: status and prospects
User-role based security profile for an object-oriented design model
Results of the Sixth Working Conference of IFIP Working Group 11.3 on Database Security on Database security, VI : status and prospects: status and prospects
Design for dynamic user-role-based security
Computers and Security
The management of computer security profiles using a role-oriented approach
Computers and Security
Lattice-Based Access Control Models
Computer
Access Rights Administration in Role-Based Security Systems
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Authentication, access control, and audit
ACM Computing Surveys (CSUR)
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Mandatory access control and role-based access control revisited
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
The ARBAC97 model for role-based administration of roles: preliminary description and outline
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
RBAC emulation on trusted DG/UX
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Specifying and managing role-based access control within a corporate intranet
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Support for discretionary role based access control in ACL-oriented operating systems
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Determining role rights from use cases
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Comparing simple role based access control models and access control lists
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Reconciling role based management and role based access control
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Role templates for content-based access control
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Future directions in role-based access control
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Rationale for the RBAC96 family of access control models
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Characteristics of role-based access control
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Design systolic systems: Illustrating of regular algorithms on synchronous array processors
Design systolic systems: Illustrating of regular algorithms on synchronous array processors
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Role-based access control: a natural approach
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Constraints for role-based access control
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Role-based access control in ORACLE7 and Trusted ORACLE7
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
NetWare 4 as an example of role-based access control
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Decentralized user-role assignment for Web-based intranets
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
An Oracle implementation of the PRA97 model for permission-role assignment
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Role based access control on MLS systems without kernel changes
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
How to do discretionary access control using roles
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Towards a more complete model of role
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Control principles and role hierarchies
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Managing role/permission relationships using object access types
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Formal specification for role based access control user/role and role/role relationship management
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Role-based access control in Java
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
The role graph model and conflict of interest
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
A role-based access control model and reference implementation within a corporate intranet
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
The specification and enforcement of authorization constraints in workflow management systems
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
The ARBAC97 model for role-based administration of roles
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
A new security policy for distributed resource management and access control
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Flexible control of downloaded executable content
ACM Transactions on Information and System Security (TISSEC)
Role-based access control on the Web using Java
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
A framework for implementing role-based access control using CORBA security service
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
On the increasing importance of constraints
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
The RSL99 language for role-based separation of duty constraints
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Supporting relationships in access control using role based access control
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
SecureFlow: a secure Web-enabled workflow management system
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Dynamic rights: safe extensible access control
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Towards a UML based approach to role engineering
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
The uses of role hierarchies in access control
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Conflicts in Policy-Based Distributed Systems Management
IEEE Transactions on Software Engineering
Rewriting Histories: Recovering from Malicious Transactions
Distributed and Parallel Databases - Security of data and transaction processing
An architecture for distributed OASIS services
IFIP/ACM International Conference on Distributed systems platforms
Monitoring, security, and dynamic configuration with the dynamicTAO reflective ORB
IFIP/ACM International Conference on Distributed systems platforms
Injecting RBAC to secure a Web-based workflow system
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Application of XML tools for enterprise-wide RBAC implementation tasks
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Modeling users in role-based access control
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Role delegation in role-based access control
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
The NIST model for role-based access control: towards a unified standard
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
A model of accountability, confidentiality and override for healthcare and other applications
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Enabling technologies for role based online decision engines
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Three for one: role-based access-control management in rapidly changing heterogeneous environments
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Integrated constraints and inheritance in DTAC
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Engineering authority and trust in cyberspace: the OM-AM and RBAC way
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Constraint specification for object model of access control based on role
ACM SIGSOFT Software Engineering Notes
An object-oriented model of access control based on role
ACM SIGSOFT Software Engineering Notes
An access control model for simplifying constraint expression
Proceedings of the 7th ACM conference on Computer and communications security
An access control model for video database systems
Proceedings of the ninth international conference on Information and knowledge management
Configuring role-based access control to enforce mandatory and discretionary access control policies
ACM Transactions on Information and System Security (TISSEC)
Ensuring privacy in presence awareness: an automated verification approach
CSCW '00 Proceedings of the 2000 ACM conference on Computer supported cooperative work
Separating access control policy, enforcement, and functionality in extensible systems
ACM Transactions on Computer Systems (TOCS)
Managing security policies in a distributed environment using eXtensible markup language (XML)
Proceedings of the 2001 ACM symposium on Applied computing
The role-based access control system of a European bank: a case study and discussion
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Securing context-aware applications using environment roles
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
A logical framework for reasoning about access control models
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Access control mechanisms for inter-organizational workflow
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Improving the granularity of access control in Windows NT
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
A graphical definition of authorization schema in the DTAC model
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Managing access control complexity using metrices
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Panel: which access control technique will provide the greatest overall benefit
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
A rule-based framework for role based delegation
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Structured management of role-permission relationships
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
A model of OASIS role-based access control and its support for active security
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
An argument for the role-based access control model
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Reflective authorization systems: possibilities, benefits, and drawbacks
Secure Internet programming
Access control in configurable systems
Secure Internet programming
Enabling location-based applications
WMC '01 Proceedings of the 1st international workshop on Mobile commerce
Role-based authorization constraints specification
ACM Transactions on Information and System Security (TISSEC)
ACM SIGOPS Operating Systems Review
Role-based access control on the web
ACM Transactions on Information and System Security (TISSEC)
Secure virtual enclaves: Supporting coalition use of distributed application technologies
ACM Transactions on Information and System Security (TISSEC)
Practical safety in flexible access control models
ACM Transactions on Information and System Security (TISSEC)
TRBAC: A temporal role-based access control model
ACM Transactions on Information and System Security (TISSEC)
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
Design and implementation of a flexible RBAC-service in an object-oriented scripting language
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Distributed credential chain discovery in trust management: extended abstract
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
An authorization model for a public key management service
ACM Transactions on Information and System Security (TISSEC)
An authorization model for temporal and derived data: securing information portals
ACM Transactions on Information and System Security (TISSEC)
Role-based access control and the access control matrix
ACM SIGOPS Operating Systems Review
Managing access control policies using access control spaces
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A lightweight approach to specification and analysis of role-based access control extensions
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
An access control language for web services
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A scenario-driven role engineering process for functional RBAC roles
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Observations on the role life-cycle in the context of enterprise security management
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Towards usage control models: beyond traditional access control
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Temporal hierarchies and inheritance semantics for GTRBAC
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Models for coalition-based access control (CBAC)
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A context-related authorization and access control method based on RBAC:
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A role-based delegation framework for healthcare information systems
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
ACM SIGAda Ada Letters
Administrative scope and role hierarchy operations
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A model for role administration using organization structure
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Information flow analysis of an RBAC system
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Toward open, secure, widely distributed services
Communications of the ACM - Adaptive middleware
A secure workflow system for dynamic collaboration
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Secure and selective dissemination of XML documents
ACM Transactions on Information and System Security (TISSEC)
A graph-based formalism for RBAC
ACM Transactions on Information and System Security (TISSEC)
Context sensitivity in role-based access control
ACM SIGOPS Operating Systems Review
Improving the granularity of access control for Windows 2000
ACM Transactions on Information and System Security (TISSEC)
The economics of information security investment
ACM Transactions on Information and System Security (TISSEC)
A model of OASIS role-based access control and its support for active security
ACM Transactions on Information and System Security (TISSEC)
Policy algebras for access control the predicate case
Proceedings of the 9th ACM conference on Computer and communications security
Authorization and Access Control of Application Data in Workflow Systems
Journal of Intelligent Information Systems - Special issue: A survey of research questions for intelligent information systems in education
Managing Workflow Authorization Constraints through Active Database Technology
Information Systems Frontiers
A logical framework for reasoning about access control models
ACM Transactions on Information and System Security (TISSEC)
AutoWF: a secure web workflow system using autonomous objects
Data & Knowledge Engineering
Integrating role graphs: a tool for security integration
Data & Knowledge Engineering - Data and applications security
IEEE Internet Computing
Access Control and Session Management in the HTTP Environment
IEEE Internet Computing
Managing Access in Extended Enterprise Networks
IEEE Internet Computing
Data Management Issues and Trade-Offs in CSCW Systems
IEEE Transactions on Knowledge and Data Engineering
A Content-Based Authorization Model for Digital Libraries
IEEE Transactions on Knowledge and Data Engineering
A Role-Based Access Control for Intranet Security
IEEE Internet Computing
The design and applications of a context service
ACM SIGMOBILE Mobile Computing and Communications Review
A Policy Based Role Object Model
EDOC '97 Proceedings of the 1st International Conference on Enterprise Distributed Object Computing
Dynamic Policy Model for Large Evolving Enterprises
EDOC '01 Proceedings of the 5th IEEE International Conference on Enterprise Distributed Object Computing
The Policy Machine for Security Policy Management
ICCS '01 Proceedings of the International Conference on Computational Science-Part II
PADL '01 Proceedings of the Third International Symposium on Practical Aspects of Declarative Languages
A Situation-Oriented and Personalized Framework for Role Modeling
PAKM '02 Proceedings of the 4th International Conference on Practical Aspects of Knowledge Management
HMT: Modeling Temporal Aspects in Hypermedia Applications
WAIM '00 Proceedings of the First International Conference on Web-Age Information Management
The Work Concept RBAC Model for the Access Control of the Distributed Web Server Environment
WI '01 Proceedings of the First Asia-Pacific Conference on Web Intelligence: Research and Development
An Analysis of Access Control Models
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
A Knowledge-Based Approach to Internet Authorizations
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
On the Formal Specifications of Electronic Institutions
Agent Mediated Electronic Commerce, The European AgentLink Perspective.
Organizational Modeling for Efficient Specification of Information Security Requirements
ADBIS '99 Proceedings of the Third East European Conference on Advances in Databases and Information Systems
A Uniform Model for Authorization and Access Control in Enterprise Information Platform
EDCIS '02 Proceedings of the First International Conference on Engineering and Deployment of Cooperative Information Systems
Securing Agent Based Architectures
EDCIS '02 Proceedings of the First International Conference on Engineering and Deployment of Cooperative Information Systems
Reflections on MOPs, Components, and Java Security
ECOOP '01 Proceedings of the 15th European Conference on Object-Oriented Programming
Building Groupwares over Duplicated Object Systems
CRIWG '02 Proceedings of the 8th International Workshop on Groupware: Design, Implementation and Use
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
A Role-Based Model for Access Control in Database Federations
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Web Document Access Control Using Two-Layered Storage Structures with RBAC Server
EurAsia-ICT '02 Proceedings of the First EurAsian Conference on Information and Communication Technology
Access Control and Trust in the Use of Widely Distributed Services
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
TRBAC: A Temporal Authorization Model
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Future Directions in Role-Based Access Control Models
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Tower: A Language for Role Based Access Control
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
The Ponder Policy Specification Language
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
Model-Based Tool-Assistance for Packet-Filter Design
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
Policy-Driven Management of Agent Systems
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
Modelling Security Policies in Hypermedia and Web-Based Applications
Web Engineering, Software Engineering and Web Application Development
Using NFS to Implement Role-Based Access Control
WET-ICE '97 Proceedings of the 6th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises
How Role Based Access Control is Implemented in SESAME
WET-ICE '97 Proceedings of the 6th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises
SecureUML: A UML-Based Modeling Language for Model-Driven Security
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
Different Smartcard-Based Approaches to Physical Access Control
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
A Pragmatic Approach to Conceptual Modeling of OLAP Security
ER '01 Proceedings of the 20th International Conference on Conceptual Modeling: Conceptual Modeling
Data Protection by Logic Programming
CL '00 Proceedings of the First International Conference on Computational Logic
A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI
ISC '02 Proceedings of the 5th International Conference on Information Security
A Flexible Access Control Model for Multimedia Medical Image Security
PCM '01 Proceedings of the Second IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
A Policy Language for the Management of Distributed Agents
AOSE '01 Revised Papers and Invited Contributions from the Second International Workshop on Agent-Oriented Software Engineering II
Task-Role Based Access Control (T-RBAC): An Improved Access Control Model for Enterprise Environment
DEXA '00 Proceedings of the 11th International Conference on Database and Expert Systems Applications
Data Security for Distributed Meeting Systems
DEXA '00 Proceedings of the 11th International Conference on Database and Expert Systems Applications
Information Flow Control among Objects in Role-Based Access Control Model
DEXA '01 Proceedings of the 12th International Conference on Database and Expert Systems Applications
A Flexible Role-Based Access Control Model for Multimedia Medical Image Database Systems
ISC '01 Proceedings of the 4th International Conference on Information Security
EROICA: A Rule-Based Approach to Organizational Policy Management in Workflow Systems
WAIM '02 Proceedings of the Third International Conference on Advances in Web-Age Information Management
An Implementation of a Secure Version of NFS Including RBAC
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Access Control Infrastructure for Digital Objects
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Administrative scope: A foundation for role-based administrative models
ACM Transactions on Information and System Security (TISSEC)
Designing a distributed access control processor for network services on the Web
Proceedings of the 2002 ACM workshop on XML security
Role-Based Access Control With X.509 Attribute Certificates
IEEE Internet Computing
An authorization system for digital libraries
The VLDB Journal — The International Journal on Very Large Data Bases
ObjectGlobe: Ubiquitous query processing on the Internet
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy through pseudonymity in user-adaptive systems
ACM Transactions on Internet Technology (TOIT)
The PERMIS X.509 role based privilege management infrastructure
Future Generation Computer Systems - Special section: Selected papers from the TERENA networking conference 2002
Distributed credential chain discovery in trust management
Journal of Computer Security
Manageable access control for CORBA
Journal of Computer Security - Special issue on ESORICS 2000
An administration concept for the enterprise role-based access control model
Proceedings of the eighth ACM symposium on Access control models and technologies
A methodology for managing roles in legacy systems
Proceedings of the eighth ACM symposium on Access control models and technologies
Dependencies and separation of duty constraints in GTRBAC
Proceedings of the eighth ACM symposium on Access control models and technologies
An approach to engineer and enforce context constraints in an RBAC environment
Proceedings of the eighth ACM symposium on Access control models and technologies
On context in authorization policy
Proceedings of the eighth ACM symposium on Access control models and technologies
Role-based access control for collaborative enterprise in peer-to-peer computing environments
Proceedings of the eighth ACM symposium on Access control models and technologies
Induced role hierarchies with attribute-based RBAC
Proceedings of the eighth ACM symposium on Access control models and technologies
PBDM: a flexible delegation model in RBAC
Proceedings of the eighth ACM symposium on Access control models and technologies
On modeling system-centric information for role engineering
Proceedings of the eighth ACM symposium on Access control models and technologies
Role mining - revealing business roles for security administration using data mining technology
Proceedings of the eighth ACM symposium on Access control models and technologies
Static verification of security requirements in role based CSCW systems
Proceedings of the eighth ACM symposium on Access control models and technologies
An access control model for dynamic client-side content
Proceedings of the eighth ACM symposium on Access control models and technologies
Dynamic and risk-aware network access management
Proceedings of the eighth ACM symposium on Access control models and technologies
Dynamic access control: preserving safety and trust for network defense operations
Proceedings of the eighth ACM symposium on Access control models and technologies
Access control and trust in the use of widely distributed services
Software—Practice & Experience - Special issue: Middleware
Access control: principles and solutions
Software—Practice & Experience - Special issue: Security software
Implementing role based access control for federated information systems on the web
ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21
Location history in a low-cost context awareness environment
ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21
A Role-Based Security Architecture for Business Intelligence
TOOLS '00 Proceedings of the Technology of Object-Oriented Languages and Systems (TOOLS 34'00)
Role-based security for distributed object systems
WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
Formal description of perfect security
ICCC '02 Proceedings of the 15th international conference on Computer communication
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
Integrating PMI services in CORBA applications
Computer Standards & Interfaces - CORBA: protocols, applications, process models and standards
Role-based access control on the web using LDAP
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Constraints-based access control
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Secure role-based workflow models
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
State-dependent security decisions for distributed object-systems
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Flexible security policies in SQL
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Generalized Role-Based Access Control
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
Cross-Domain Access Control via PKI
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
A System to Specify and Manage Multipolicy Access Control Models
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Meta-Policies for Distributed Role-Based Access Control Systems
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Security for XML messaging services: a component-based approach
Journal of Network and Computer Applications
Policy management using access control spaces
ACM Transactions on Information and System Security (TISSEC)
A rule-based framework for role-based delegation and revocation
ACM Transactions on Information and System Security (TISSEC)
Specification and Classification of Role-based Authorization Policies
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Policy Storage for Role-Based Access Control Systems
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Task-role-based access control model
Information Systems
Policy 2003: Workshop on Policies for Distributed Systems and Networks
Journal of Network and Systems Management
An Approach for Modeling and Analysis of Security System Architectures
IEEE Transactions on Knowledge and Data Engineering
On permissions, inheritance and role hierarchies
Proceedings of the 10th ACM conference on Computer and communications security
Flexible access control policy specification with constraint logic programming
ACM Transactions on Information and System Security (TISSEC)
Workflow-based Authorization Service in Grid
GRID '03 Proceedings of the 4th International Workshop on Grid Computing
Dynamic Context-aware Access Control for Grid Applications
GRID '03 Proceedings of the 4th International Workshop on Grid Computing
Role-based authorization in decentralized health care environments
Proceedings of the 2003 ACM symposium on Applied computing
A role administration system in role-based authorization infrastructures: design and implementation
Proceedings of the 2003 ACM symposium on Applied computing
A unified security framework for networked applications
Proceedings of the 2003 ACM symposium on Applied computing
Organizational modeling in UML and XML in the context of workflow systems
Proceedings of the 2003 ACM symposium on Applied computing
Role-Based Access Controls: Status, Dissemination, and Prospects for Generic Security Mechanisms
Electronic Commerce Research
A policy-based security framework for Web-enabled applications
ISICT '03 Proceedings of the 1st international symposium on Information and communication technologies
Protocol Moderators as Active Middle-Agents in Multi-Agent Systems
Autonomous Agents and Multi-Agent Systems
Role-based access control for publish/subscribe middleware architectures
Proceedings of the 2nd international workshop on Distributed event-based systems
Tucupi: a flexible workflow system based on overridable constraints
Proceedings of the 2004 ACM symposium on Applied computing
An architecture for supporting vicarious learning in a distributed environment
Proceedings of the 2004 ACM symposium on Applied computing
Proceedings of the 2004 ACM symposium on Applied computing
A Web services composition approach based on software agents and context
Proceedings of the 2004 ACM symposium on Applied computing
A bitmap-based access control for restricted views of XML documents
Proceedings of the 2003 ACM workshop on XML security
Concept-level access control for the Semantic Web
Proceedings of the 2003 ACM workshop on XML security
Root Kits: an operating systems viewpoint
ACM SIGOPS Operating Systems Review
The semantics of an extended referential integrity for a multilevel secure relational data model
Data & Knowledge Engineering
Mesmerize: an open framework for enterprise security management
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
Proceedings of the 2003 workshop on New security paradigms
Embedding role-based access control model in object-oriented systems to protect privacy
Journal of Systems and Software
A logical specification for usage control
Proceedings of the ninth ACM symposium on Access control models and technologies
On the role of roles: from role-based to role-sensitive access control
Proceedings of the ninth ACM symposium on Access control models and technologies
A role-based approach to access control for XML databases
Proceedings of the ninth ACM symposium on Access control models and technologies
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Proceedings of the ninth ACM symposium on Access control models and technologies
Proceedings of the ninth ACM symposium on Access control models and technologies
Security analysis in role-based access control
Proceedings of the ninth ACM symposium on Access control models and technologies
Role-based cascaded delegation
Proceedings of the ninth ACM symposium on Access control models and technologies
A composite rbac approach for large, complex organizations
Proceedings of the ninth ACM symposium on Access control models and technologies
A compressed accessibility map for XML
ACM Transactions on Database Systems (TODS)
Databases, but not as we know them
ADC '04 Proceedings of the 15th Australasian database conference - Volume 27
An integrated approach to engineer and enforce context constraints in RBAC environments
ACM Transactions on Information and System Security (TISSEC)
Content-triggered trust negotiation
ACM Transactions on Information and System Security (TISSEC)
Separation of duties for access control enforcement in workflow environments
IBM Systems Journal - End-to-end security
A First Step Towards Formal Verification of Security Policy Properties for RBAC
QSIC '04 Proceedings of the Quality Software, Fourth International Conference
Static analysis of role-based access control in J2EE applications
ACM SIGSOFT Software Engineering Notes
Discovering Services Is Not Enough
IEEE Distributed Systems Online
SOWAC: A Service-Oriented Workflow Access Control Model
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
Context-Based Access Control for Ubiquitous Service Provisioning
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
SMARXO: towards secured multimedia applications by adopting RBAC, XML and object-relational database
Proceedings of the 12th annual ACM international conference on Multimedia
On the benefits of decomposing policy engines into components
ARM '04 Proceedings of the 3rd workshop on Adaptive and reflective middleware
A logic-based framework for attribute based access control
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
Synthesising verified access control systems in XACML
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
Data & Knowledge Engineering - Special jubilee issue: DKE 50
On mutually-exclusive roles and separation of duty
Proceedings of the 11th ACM conference on Computer and communications security
Attestation-based policy enforcement for remote access
Proceedings of the 11th ACM conference on Computer and communications security
Proceedings of the 11th ACM conference on Computer and communications security
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
Proceedings of the thirteenth ACM international conference on Information and knowledge management
Specification and querying of security constraints in the EFSOC framework
Proceedings of the 2nd international conference on Service oriented computing
A compositional framework for access control policies enforcement
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
authUML: a three-phased framework to analyze access control specifications in use cases
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
A Generalized Temporal Role-Based Access Control Model
IEEE Transactions on Knowledge and Data Engineering
Towards a rule model for self-adaptive software
ACM SIGSOFT Software Engineering Notes
Role-based authorizations for workflow systems in support of task-based separation of duty
Journal of Systems and Software
Providing flexible access control to an information flow control model
Journal of Systems and Software
X-RDR: a role-based delegation processor for web-based information systems
ACM SIGOPS Operating Systems Review
Modeling and Analyzing of Workflow Authorization Management
Journal of Network and Systems Management
SubDomain: Parsimonious Server Security
LISA '00 Proceedings of the 14th USENIX conference on System administration
A rule-based framework for role-based constrained delegation
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Organization structure based access control model
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Model-Driven Trust Negotiation for Web Services
IEEE Internet Computing
Simulation Verification and Validation by Dynamic Policy Enforcement
ANSS '05 Proceedings of the 38th annual Symposium on Simulation
Enterprise access policy enforcement for applications through hybrid models and XSLT technologies
ICEC '04 Proceedings of the 6th international conference on Electronic commerce
Toward an Agent-Based and Context-Oriented Approach for Web Services Composition
IEEE Transactions on Knowledge and Data Engineering
Access control in collaborative systems
ACM Computing Surveys (CSUR)
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
A scalable authorization approach for the Globus grid system
Future Generation Computer Systems - Special issue: Advanced grid technologies
Preventing information leakage within workflows that execute among competing organizations
Journal of Systems and Software - Special issue: Software engineering education and training
Injecting roles in Java agents through runtime bytecode manipulation
IBM Systems Journal
Integrity constraints in trust management
Proceedings of the tenth ACM symposium on Access control models and technologies
Composing and combining policies under the policy machine
Proceedings of the tenth ACM symposium on Access control models and technologies
A fine-grained, controllable, user-to-user delegation method in RBAC
Proceedings of the tenth ACM symposium on Access control models and technologies
Rule support for role-based access control
Proceedings of the tenth ACM symposium on Access control models and technologies
Peer-to-peer access control architecture using trusted computing technology
Proceedings of the tenth ACM symposium on Access control models and technologies
SERAT: SEcure role mApping technique for decentralized secure interoperability
Proceedings of the tenth ACM symposium on Access control models and technologies
Proceedings of the tenth ACM symposium on Access control models and technologies
ACM Transactions on Information and System Security (TISSEC)
Beyond proof-of-compliance: security analysis in trust management
Journal of the ACM (JACM)
Formal specification of role-based security policies for clinical information systems
Proceedings of the 2005 ACM symposium on Applied computing
Mediation security specification and enforcement for heterogeneous databases
Proceedings of the 2005 ACM symposium on Applied computing
A case study of separation of duty properties in the context of the Austrian "eLaw" process.
Proceedings of the 2005 ACM symposium on Applied computing
SmartGate: a smart push-pull approach to support role-based security in web gateways
Proceedings of the 2005 ACM symposium on Applied computing
Timed constraint programming: a declarative approach to usage control
PPDP '05 Proceedings of the 7th ACM SIGPLAN international conference on Principles and practice of declarative programming
Applying Semantic Knowledge to Real-Time Update of Access Control Policies
IEEE Transactions on Knowledge and Data Engineering
IEEE Transactions on Dependable and Secure Computing
A Trust-Based Context-Aware Access Control Model for Web-Services
Distributed and Parallel Databases
Embedding JAAS in agent roles to apply local security policies
Proceedings of the 3rd international symposium on Principles and practice of programming in Java
A policy flexible architecture for secure operating system
ACM SIGOPS Operating Systems Review
An approach to cooperative updates of XML documents in distributed systems
Journal of Computer Security
Characterizing dynamics of information leakage in security-sensitive software process
ACSW Frontiers '05 Proceedings of the 2005 Australasian workshop on Grid computing and e-research - Volume 44
An organisation infrastructure for Multi-Agent Systems based on Agent Coordination Contexts
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
Towards an architectural treatment of software security: a connector-centric approach
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
Articulating and enforcing authorisation policies with UML and OCL
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
Exploiting runtime bytecode manipulation to add roles to Java agents
Science of Computer Programming - Special issue on principles and practice of programming in java (PPPJ 2003)
PRES: a practical flexible RBAC workflow system
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
Secure Interoperation in a Multidomain Environment Employing RBAC Policies
IEEE Transactions on Knowledge and Data Engineering
Context Awareness: a Practitioner"s Perspective
UDM '05 Proceedings of the International Workshop on Ubiquitous Data Management
A function-based access control model for XML databases
Proceedings of the 14th ACM international conference on Information and knowledge management
Secure collaboration in mediator-free environments
Proceedings of the 12th ACM conference on Computer and communications security
Understanding and developing role-based administrative models
Proceedings of the 12th ACM conference on Computer and communications security
Dynamic and efficient key management for access hierarchies
Proceedings of the 12th ACM conference on Computer and communications security
Maintaining privacy on derived objects
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
A delegation framework for federated identity management
Proceedings of the 2005 workshop on Digital identity management
Access control management in a distributed environment supporting dynamic collaboration
Proceedings of the 2005 workshop on Digital identity management
Database security curriculum in InfoSec program
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
EFSOC: A Layered Framework for Developing Secure Interactions between Web-Services
Distributed and Parallel Databases
Formal model and policy specification of usage control
ACM Transactions on Information and System Security (TISSEC)
X-gtrbac admin: A decentralized administration model for enterprise-wide access control
ACM Transactions on Information and System Security (TISSEC)
SESAME: Scalable, Environment Sensitive Access Management Engine
Cluster Computing
A specification model for context-based collaborative applications
Pervasive and Mobile Computing
Secure context-sensitive authorization
Pervasive and Mobile Computing
Towards a dynamic multi-policy dissemination control model: (DMDCON)
ACM SIGMOD Record
Secure information sharing enabled by Trusted Computing and PEI models
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Application security support in the operating system kernel
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Safety analysis of usage control authorization models
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Applying security policies through agent roles: a JAAS based approach
Science of Computer Programming - Special issue: Principles and practices of programming in Java (PPPJ 2004)
Multimedia Tools and Applications
A taxonomy of Data Grids for distributed data sharing, management, and processing
ACM Computing Surveys (CSUR)
Access control, confidentiality and privacy for video surveillance databases
Proceedings of the eleventh ACM symposium on Access control models and technologies
On classifying access control implementations for distributed systems
Proceedings of the eleventh ACM symposium on Access control models and technologies
Fine-grained role-based delegation in presence of the hybrid role hierarchy
Proceedings of the eleventh ACM symposium on Access control models and technologies
Secure resource description framework: an access control model
Proceedings of the eleventh ACM symposium on Access control models and technologies
Constraint generation for separation of duty
Proceedings of the eleventh ACM symposium on Access control models and technologies
A model-checking approach to analysing organisational controls in a loan origination process
Proceedings of the eleventh ACM symposium on Access control models and technologies
Towards reasonability properties for access-control policy languages
Proceedings of the eleventh ACM symposium on Access control models and technologies
Data-centric security: role analysis and role typestates
Proceedings of the eleventh ACM symposium on Access control models and technologies
Role-based access management for ad-hoc collaborative sharing
Proceedings of the eleventh ACM symposium on Access control models and technologies
Role-Based Access Control for Grid Database Services Using the Community Authorization Service
IEEE Transactions on Dependable and Secure Computing
Byzantine fault tolerant public key authentication in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
PKI-based secure mobile access to electronic health services and data
Technology and Health Care
Inferring dynamic credentials for rôle-based trust management
Proceedings of the 8th ACM SIGPLAN international conference on Principles and practice of declarative programming
Intentional access management: making access control usable for end-users
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Role-Based access control consistency validation
Proceedings of the 2006 international symposium on Software testing and analysis
Role-based access control for a distributed calculus
Journal of Computer Security - Special issue on CSFW17
A wide-area Distribution Network for free software
ACM Transactions on Internet Technology (TOIT)
An effective role administration model using organization structure
ACM Transactions on Information and System Security (TISSEC)
Agents for e-business applications
AAMAS '06 Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems
Token-based dynamic trust establishment for web services
Proceedings of the 43rd annual Southeast regional conference - Volume 2
User privacy-preserving identity data dependencies
Proceedings of the second ACM workshop on Digital identity management
Role-based access control for data service integration
Proceedings of the 3rd ACM workshop on Secure web services
An extended RBAC profile of XACML
Proceedings of the 3rd ACM workshop on Secure web services
Proceedings of the 3rd ACM workshop on Secure web services
Secure attribute-based systems
Proceedings of the 13th ACM conference on Computer and communications security
Resiliency policies in access control
Proceedings of the 13th ACM conference on Computer and communications security
Beyond separation of duty: an algebra for specifying high-level security policies
Proceedings of the 13th ACM conference on Computer and communications security
Policy-based security management for federated healthcare databases (or RHIOs)
HIKM '06 Proceedings of the international workshop on Healthcare information and knowledge management
Security analysis in role-based access control
ACM Transactions on Information and System Security (TISSEC)
Efficient Access Control in Wireless Network
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
GEO-RBAC: A spatially aware RBAC
ACM Transactions on Information and System Security (TISSEC)
A review of information security issues and respective research contributions
ACM SIGMIS Database
Information and Software Technology
On Relating and Integrating Two Trust Management Frameworks
Electronic Notes in Theoretical Computer Science (ENTCS)
Access control in collaborative commerce
Decision Support Systems
Science of Computer Programming - Special issue on security issues in coordination models, languages, and systems
Administration in role-based access control
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Managing RBAC states with transitive relations
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Extended privilege inheritance in RBAC
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
History-based access control for XML documents
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
A Negotiation Scheme for Access Rights Establishment in Autonomic Communication
Journal of Network and Systems Management
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
Science of Computer Programming
Science of Computer Programming
On mutually exclusive roles and separation-of-duty
ACM Transactions on Information and System Security (TISSEC)
ACM Transactions on Information and System Security (TISSEC)
Visual modeling and formal specification of constraints of RBAC using semantic web technology
Knowledge-Based Systems
A lattice-based approach for updating access control policies in real-time
Information Systems
Towards secure information sharing using role-based delegation
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Enforcing provisioning and authorization policy in the Antigone system
Journal of Computer Security
Requirements for scalable access control and security management architectures
ACM Transactions on Internet Technology (TOIT)
A group-based authorization model for cooperative systems
ECSCW'97 Proceedings of the fifth conference on European Conference on Computer-Supported Cooperative Work
Design and implementation of a secure wide-area object middleware
Computer Networks: The International Journal of Computer and Telecommunications Networking
Developing secure data warehouses with a UML extension
Information Systems
Flexible and efficient access control in oracle
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Key management for content access control in a hierarchy
Computer Networks: The International Journal of Computer and Telecommunications Networking
X-FEDERATE: A Policy Engineering Framework for Federated Access Management
IEEE Transactions on Software Engineering
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
ICSE '07 Proceedings of the 29th international conference on Software Engineering
Privacy-aware role based access control
Proceedings of the 12th ACM symposium on Access control models and technologies
PEI models towards scalable, usable and high-assurance information sharing
Proceedings of the 12th ACM symposium on Access control models and technologies
Discretionary access control with the administrative role graph model
Proceedings of the 12th ACM symposium on Access control models and technologies
Inter-domain role mapping and least privilege
Proceedings of the 12th ACM symposium on Access control models and technologies
The role mining problem: finding a minimal descriptive set of roles
Proceedings of the 12th ACM symposium on Access control models and technologies
Proceedings of the 12th ACM symposium on Access control models and technologies
Proceedings of the 12th ACM symposium on Access control models and technologies
Towards realizing a formal RBAC model in real systems
Proceedings of the 12th ACM symposium on Access control models and technologies
WindowBox: a simple security model for the connected desktop
WSS'00 Proceedings of the 4th conference on USENIX Windows Systems Symposium - Volume 4
Role-based Architectural Modelling of Socio-Technical Systems
Electronic Notes in Theoretical Computer Science (ENTCS)
Engineering Trust Management into Software Models
MISE '07 Proceedings of the International Workshop on Modeling in Software Engineering
A Uniform Framework for Security and Trust Modeling and Analysis with Crypto-CCS
Electronic Notes in Theoretical Computer Science (ENTCS)
On optimizing compatible security policies in wireless networks
EURASIP Journal on Wireless Communications and Networking
Formal foundations for hybrid hierarchies in GTRBAC
ACM Transactions on Information and System Security (TISSEC)
Journal of Parallel and Distributed Computing
Policies as signals in collaborative policy engineering
HotAC II Hot Topics in Autonomic Computing on Hot Topics in Autonomic Computing
Dynamic Work Distribution in Workflow Management Systems: How to Balance Quality and Performance
Journal of Management Information Systems
Editorial: Some issues in privacy data management
Data & Knowledge Engineering
Role-based 3D visualisation for asynchronous PLM collaboration
Computers in Industry
Web services discovery in secure collaboration environments
ACM Transactions on Internet Technology (TOIT)
Persistent access control: a formal model for drm
Proceedings of the 2007 ACM workshop on Digital Rights Management
Trust management for trusted computing platforms in web services
Proceedings of the 2007 ACM workshop on Scalable trusted computing
What can identity-based cryptography offer to web services?
Proceedings of the 2007 ACM workshop on Secure web services
lightweight decentralized authorization model for inter-domain collaborations
Proceedings of the 2007 ACM workshop on Secure web services
Security policy compliance with violation management
Proceedings of the 2007 ACM workshop on Formal methods in security engineering
Security policy analysis using deductive spreadsheets
Proceedings of the 2007 ACM workshop on Formal methods in security engineering
Weaving rewrite-based access control policies
Proceedings of the 2007 ACM workshop on Formal methods in security engineering
Efficient policy analysis for administrative role based access control
Proceedings of the 14th ACM conference on Computer and communications security
Automaton segmentation: a new approach to preserve privacy in xml information brokering
Proceedings of the 14th ACM conference on Computer and communications security
Human-to-Human authorization for resource sharing in SHAD: Roles and protocols
Pervasive and Mobile Computing
Limiting disclosure in hippocratic databases
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
A dynamic key management solution to access hierarchy
International Journal of Network Management
A Critique of the ANSI Standard on Role-Based Access Control
IEEE Security and Privacy
RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control"
IEEE Security and Privacy
Trust-enhanced Security in Location-based Adaptive Authentication
Electronic Notes in Theoretical Computer Science (ENTCS)
Artificial Intelligence and Law
Information Assurance: Dependability and Security in Networked Systems
Information Assurance: Dependability and Security in Networked Systems
Expressive security policy rules using Layered Conceptual Graphs
Knowledge-Based Systems
Extended RBAC-based design and implementation for a secure data warehouse
International Journal of Business Intelligence and Data Mining
Concurrency control based on role concept
International Journal of High Performance Computing and Networking
Supporting selective information sharing with people-tagging
CHI '08 Extended Abstracts on Human Factors in Computing Systems
Workflow authorisation in mediator-free environments
International Journal of Security and Networks
RB-GACA: an RBAC based grid access control architecture
International Journal of Grid and Utility Computing
On the design, implementation and application of an authorisation architecture for web services
International Journal of Information and Computer Security
Document access control in organisational workflows
International Journal of Information and Computer Security
Proceedings of the 2008 ACM symposium on Applied computing
Implementing secure document circulation: a prototype
Proceedings of the 2008 ACM symposium on Applied computing
A cost-driven approach to role engineering
Proceedings of the 2008 ACM symposium on Applied computing
On delegation and workflow execution models
Proceedings of the 2008 ACM symposium on Applied computing
Preventing information leakage in C applications using RBAC-based model
SEPADS'06 Proceedings of the 5th WSEAS International Conference on Software Engineering, Parallel and Distributed Systems
Access control in mobile ambient calculi: A comparative view
Theoretical Computer Science
Role-based access control for boxed ambients
Theoretical Computer Science
Developing a security protocol for a distributed decision support system in a healthcare environment
Proceedings of the 30th international conference on Software engineering
On spatio-temporal constraints and inheritance in role-based access control
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Synthesising verified access control systems through model checking
Journal of Computer Security
Reconciling privacy and security in pervasive computing: the case for pseudonymous group membership
Proceedings of the 5th international workshop on Middleware for pervasive and ad-hoc computing: held at the ACM/IFIP/USENIX 8th International Middleware Conference
Middleware: just another level for orchestration
Proceedings of the 2007 Workshop on Middleware for next-generation converged networks and applications
Migrating to optimal RBAC with minimal perturbation
Proceedings of the 13th ACM symposium on Access control models and technologies
Authorization recycling in RBAC systems
Proceedings of the 13th ACM symposium on Access control models and technologies
ROWLBAC: representing role based access control in OWL
Proceedings of the 13th ACM symposium on Access control models and technologies
Proceedings of the 13th ACM symposium on Access control models and technologies
RBAC administration in distributed systems
Proceedings of the 13th ACM symposium on Access control models and technologies
An obligation model bridging access control policies and privacy policies
Proceedings of the 13th ACM symposium on Access control models and technologies
Detecting and resolving policy misconfigurations in access-control systems
Proceedings of the 13th ACM symposium on Access control models and technologies
Beyond separation of duty: An algebra for specifying high-level security policies
Journal of the ACM (JACM)
Using First-Order Logic to Reason about Policies
ACM Transactions on Information and System Security (TISSEC)
Authorization in trust management: Features and foundations
ACM Computing Surveys (CSUR)
Purpose based access control for privacy protection in relational database systems
The VLDB Journal — The International Journal on Very Large Data Bases
The Journal of Supercomputing
An efficient and transparent transaction management based on the data workflow of HVEM DataGrid
CLADE '08 Proceedings of the 6th international workshop on Challenges of large applications in distributed environments
Deploying access control in distributed workflow
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
Access control in publish/subscribe systems
Proceedings of the second international conference on Distributed event-based systems
Building computational institutions for agents with RoleX
Artificial Intelligence and Law
Security for Enterprise Resource Planning Systems
Information Systems Security
INFRASTRUCTURE FOR RBAC-MAS: AN APPROACH BASED ON AGENT COORDINATION CONTEXTS
Applied Artificial Intelligence
Integrating heterogeneous agent programming platforms within artifact-based environments
Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems - Volume 1
Role management in adhoc networks
SpringSim '07 Proceedings of the 2007 spring simulaiton multiconference - Volume 1
Proceedings of the 4th symposium on Usable privacy and security
ACM Transactions on Information and System Security (TISSEC)
Roles, an interdisciplinary perspective
Applied Ontology - Roles, an interdisciplinary perspective
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Patterns for session-based access control
Proceedings of the 2006 conference on Pattern languages of programs
Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature
Computational Intelligence and Security
A Study on How to Classify the Security Rating of Medical Information Neural Network
ISNN '07 Proceedings of the 4th international symposium on Neural Networks: Part II--Advances in Neural Networks
Towards Modal Logic Formalization of Role-Based Access Control with Object Classes
FORTE '07 Proceedings of the 27th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems
Environment-Supported Roles to Develop Complex Systems
Engineering Environment-Mediated Multi-Agent Systems
A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
Capturing Semantics for Information Security and Privacy Assurance
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
High-Assurance Integrity Techniques for Databases
BNCOD '08 Proceedings of the 25th British national conference on Databases: Sharing Data, Information and Knowledge
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
DEON '08 Proceedings of the 9th international conference on Deontic Logic in Computer Science
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Supporting Security-Oriented, Collaborative nanoCMOS Electronics Research
ICCS '08 Proceedings of the 8th international conference on Computational Science, Part I
A Methodology for Bridging between RBAC and an Arbitrary Application Program
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
BPEL4RBAC: An Authorisation Specification for WS-BPEL
WISE '08 Proceedings of the 9th international conference on Web Information Systems Engineering
A Robust Sampling-Based Framework for Privacy Preserving OLAP
DaWaK '08 Proceedings of the 10th international conference on Data Warehousing and Knowledge Discovery
Patterns and Pattern Diagrams for Access Control
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Controlling Usage in Business Process Workflows through Fine-Grained Security Policies
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
BusiROLE: A Model for Integrating Business Roles into Identity Management
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Preventing Illegal Information Flow Based on Role-Based Access Control Model
NBiS '08 Proceedings of the 2nd international conference on Network-Based Information Systems
Secure Interaction Models for the HealthAgents System
SAFECOMP '08 Proceedings of the 27th international conference on Computer Safety, Reliability, and Security
An Annotation-Based Access Control Model and Tools for Collaborative Information Spaces
WSKS '08 Proceedings of the 1st world summit on The Knowledge Society: Emerging Technologies and Information Systems for the Knowledge Society
Compact and Anonymous Role-Based Authorization Chain
ACM Transactions on Information and System Security (TISSEC)
Dynamic and Efficient Key Management for Access Hierarchies
ACM Transactions on Information and System Security (TISSEC)
Security against the business partner
Proceedings of the 2008 ACM workshop on Secure web services
An access control reference architecture
Proceedings of the 2nd ACM workshop on Computer security architectures
Preventing conflict situations during authorization
WSEAS Transactions on Computers
User identification for cross-system personalisation
Information Sciences: an International Journal
Situation-Based Access Control: Privacy management via modeling of patient data access scenarios
Journal of Biomedical Informatics
Human-Computer Interaction
Enforcing security in the AgentScape middleware
Proceedings of the 2008 workshop on Middleware security
Towards comprehensive support for organizational mining
Decision Support Systems
Towards the development of privacy-aware systems
Information and Software Technology
Validating Access Control Configurations in J2EE Applications
CBSE '08 Proceedings of the 11th International Symposium on Component-Based Software Engineering
Reusability of Functionality-Based Application Confinement Policy Abstractions
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
A Rule-Based Framework Using Role Patterns for Business Process Compliance
RuleML '08 Proceedings of the International Symposium on Rule Representation, Interchange and Reasoning on the Web
Protecting Information Sharing in Distributed Collaborative Environment
Advanced Web and NetworkTechnologies, and Applications
A Model-Driven Approach for the Specification and Analysis of Access Control Policies
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
PuRBAC: Purpose-Aware Role-Based Access Control
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
Uncle-Share: Annotation-Based Access Control for Cooperative and Social Systems
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
Access Control of Federated Information Systems
EuroISI '08 Proceedings of the 1st European Conference on Intelligence and Security Informatics
Privacy analysis and enhancements for data sharing in *nix systems
International Journal of Information and Computer Security
Study on the Authorization Management Model Based on Organization in E-government
WI-IAT '08 Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
A Verification Framework for Temporal RBAC with Role Hierarchy (Short Paper)
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
HyDRo --- Hybrid Development of Roles
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
Requirements of federated trust management for service-oriented architectures
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Security and privacy for geospatial data: concepts and research directions
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
QACBAC: an owner-centric QoC-aware context-based access control model for pervasive environments
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Towards Automated Privacy Compliance in the Information Life Cycle
Advances in Web Semantics I
Separating application and security concerns in use case models
Proceedings of the 15th workshop on Early aspects
Integrating usage control with SIP-based communications
Journal of Computer Systems, Networks, and Communications
An adaptive security model using agent-oriented MDA
Information and Software Technology
Resiliency Policies in Access Control
ACM Transactions on Information and System Security (TISSEC)
Securing publish/subscribe for multi-domain systems
Proceedings of the ACM/IFIP/USENIX 2005 International Conference on Middleware
RBAC-based access control for privacy protection in pervasive environments
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Level-4 SaaS applications for healthcare industry
Proceedings of the 2nd Bangalore Annual Compute Conference
Requirements-based Access Control Analysis and Policy Specification (ReCAPS)
Information and Software Technology
A New Feature Detection Mechanism and Its Application in Secured ECG Transmission with Noise Masking
Journal of Medical Systems
Security Violation Detection for RBAC Based Interoperation in Distributed Environment
IEICE - Transactions on Information and Systems
Access Control Management for SCADA Systems
IEICE - Transactions on Information and Systems
A discussion on security typing and measurement for SOA
ACM SIGSOFT Software Engineering Notes
Model-driven business process security requirement specification
Journal of Systems Architecture: the EUROMICRO Journal
Security architecture for virtual organizations of business web services
Journal of Systems Architecture: the EUROMICRO Journal
Simplifying security policy descriptions for internet servers in secure operating systems
Proceedings of the 2009 ACM symposium on Applied Computing
Improving personal privacy in social systems with people-tagging
Proceedings of the ACM 2009 international conference on Supporting group work
Non-interactive Identity-Based DNF Signature Scheme and Its Extensions
Information Security and Cryptology --- ICISC 2008
A Verification Mechanism for Secured Message Processing in Business Collaboration
APWeb/WAIM '09 Proceedings of the Joint International Conferences on Advances in Data and Web Management
Security Analysis of Role Based Access Control Models Using Colored Petri Nets and CPNtools
Transactions on Computational Science IV
Role Based Access Control with Spatiotemporal Context for Mobile Applications
Transactions on Computational Science IV
Semantic context aware security policy deployment
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
From Access Control Policies to an Aspect-Based Infrastructure: A Metamodel-Based Approach
Models in Software Engineering
Separation of Duty in Trust-Based Collaboration
Information Security and Cryptology
A purpose-based synchronisation protocol of multiple transactions in multi-agent systems
International Journal of Business Intelligence and Data Mining
Ensuring spatio-temporal access control for real-world applications
Proceedings of the 14th ACM symposium on Access control models and technologies
Foundations for group-centric secure information sharing models
Proceedings of the 14th ACM symposium on Access control models and technologies
Efficient access enforcement in distributed role-based access control (RBAC) deployments
Proceedings of the 14th ACM symposium on Access control models and technologies
Symbolic reachability analysis for parameterized administrative role based access control
Proceedings of the 14th ACM symposium on Access control models and technologies
Extending access control models with break-glass
Proceedings of the 14th ACM symposium on Access control models and technologies
Towards a dynamic and composable model of trust
Proceedings of the 14th ACM symposium on Access control models and technologies
Task-activity based access control for process collaboration environments
Computers in Industry
Edge-RMP: Minimizing administrative assignments for role-based access control
Journal of Computer Security
International Journal of Computer Integrated Manufacturing
The Design of a New Policy Model to Support Ontology-Driven Reasoning for Autonomic Networking
Journal of Network and Systems Management
An extended JADE-S based framework for developing secure Multi-Agent Systems
Computer Standards & Interfaces
A legal information flow (LIF) scheduler based on role-based access control model
Computer Standards & Interfaces
Proceedings of the 4th International Conference on Design Science Research in Information Systems and Technology
A verification framework for access control in dynamic web applications
C3S2E '09 Proceedings of the 2nd Canadian Conference on Computer Science and Software Engineering
Roles and norms for programming agent organizations
Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 1
Privacy preservation of aggregates in hidden databases: why and how?
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
GUPTDSS: Grid Based Urban Public Transport Decision Support System
ISNN '09 Proceedings of the 6th International Symposium on Neural Networks on Advances in Neural Networks
Roles in building web applications using Java
Proceedings of the Workshop on Relationships and Associations in Object-Oriented Languages
A Delegation Logic Based Authorization Mechanism for Virtual Organizations
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
Collaboration support by co-ownership of documents
Proceedings of the 2006 conference on Cooperative Systems Design: Seamless Integration of Artifacts and Conversations -- Enhanced Concepts of Infrastructure for Communication
Description of Temporal Constraints Using Semantic Web in Role-Based Access Control
Proceedings of the 2006 conference on Knowledge-Based Software Engineering: Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering
Research on Description Logic Based Conflict Detection Methods for RB-RBAC Model
Proceedings of the 2006 conference on Advances in Intelligent IT: Active Media Technology 2006
A Secure Delegation Model Based on Multi-agent in Pervasive Environments
KES-AMSTA '09 Proceedings of the Third KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Proceedings of the 5th Symposium on Usable Privacy and Security
RBAC-MAS and SODA: Experimenting RBAC in AOSE
Engineering Societies in the Agents World IX
Coping with Exceptions in Agent-Based Workflow Enactments
Engineering Societies in the Agents World IX
Selective Regression Test for Access Control System Employing RBAC
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Formal Verification for Access Control in Web Information Sharing System
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
A Service Dependency Modeling Framework for Policy-Based Response Enforcement
DIMVA '09 Proceedings of the 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Description Logic Framework for Access Control and Security in Object-Oriented Systems
RSFDGrC '07 Proceedings of the 11th International Conference on Rough Sets, Fuzzy Sets, Data Mining and Granular Computing
Securing hierarchical multicast communications using roles
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
We have met the enemy and he is us
Proceedings of the 2008 workshop on New security paradigms
Robustly secure computer systems: a new security paradigm of system discontinuity
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
Maintaining control while delegating trust: Integrity constraints in trust management
ACM Transactions on Information and System Security (TISSEC)
Fine-Grained Access Control with Object-Sensitive Roles
Genoa Proceedings of the 23rd European Conference on ECOOP 2009 --- Object-Oriented Programming
TrustBus '09 Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business
A Formalization of HIPAA for a Medical Messaging System
TrustBus '09 Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business
A Flexible Access Control Model for Distributed Collaborative Editors
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
XML-based policy specification framework for spatiotemporal access control
Proceedings of the 2nd international conference on Security of information and networks
General-Purpose Coordination Abstractions for Managing Interaction in MAS
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
Research of Reliability-Based Four Layers Access Control Model
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
A DL-based method for access control policy conflict detecting
Proceedings of the First Asia-Pacific Symposium on Internetware
Trusted resource dissemination in Internetware systems
Proceedings of the First Asia-Pacific Symposium on Internetware
Multi-Level modeling and access control for data sharing in collaborative design
Advanced Engineering Informatics
A collaborative approach to assembly sequence planning
Advanced Engineering Informatics
Web-Traveler Policies for Images on Social Networks
World Wide Web
Role based access control for a medical database
SEA '07 Proceedings of the 11th IASTED International Conference on Software Engineering and Applications
Byzantine fault tolerant public key authentication in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Towards a conceptual framework for digital dossier management in criminal proceedings
LawTech '07 Proceedings of the Fifth IASTED International Conference on Law and Technology
Efficient and secure distribution of massive geo-spatial data
Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
A role-based XACML administration and delegation profile and its enforcement architecture
Proceedings of the 2009 ACM workshop on Secure web services
Employing PRBAC for privacy preserving data publishing
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Security-enhanced OSGi service environments
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Intelligent security and access control framework for service-oriented architecture
Information and Software Technology
Instance-level access control for business-to-business electronic commerce
IBM Systems Journal
A rule-based CBR approach for expert finding and problem diagnosis
Expert Systems with Applications: An International Journal
Enabling scientific collaboration on the Grid
Future Generation Computer Systems
Privacy-preserving similarity-based text retrieval
ACM Transactions on Internet Technology (TOIT)
Security policies for the visualization of Geo Data
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
A generalized context-based access control model for pervasive environments
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
A function-based user authority delegation model
Information Sciences: an International Journal
Model-Driven Configuration of SELinux Policies
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part II
Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper)
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Trust-Based Fuzzy Access Control Model Research
WISM '09 Proceedings of the International Conference on Web Information Systems and Mining
Towards an Approach of Semantic Access Control for Cloud Computing
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Believing the Integrity of a System
Electronic Notes in Theoretical Computer Science (ENTCS)
Paralocks: role-based information flow control and beyond
Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Injecting a permission-based delegation model to secure web-based workflow systems
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
An MDA approach to Access Control Specifications Using MOF and UML Profiles
Electronic Notes in Theoretical Computer Science (ENTCS)
Feature-based Modelling of a Complex, Online-Reconfigurable Decision Support Service
Electronic Notes in Theoretical Computer Science (ENTCS)
Distributed event-based access control
International Journal of Information and Computer Security
XML-based access control languages
Information Security Tech. Report
Laissez-faire file sharing: access control designed for individuals at the endpoints
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
Authorization model for multilevel security workflow based on RTBAC
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
Design principles for resource management systems for intelligent spaces
IWSAS'01 Proceedings of the 2nd international conference on Self-adaptive software: applications
Toward practical authorization-dependent user obligation systems
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Cryptographic role-based security mechanisms based on role-key hierarchy
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
CArtAgO: a framework for prototyping artifact-based environments in MAS
E4MAS'06 Proceedings of the 3rd international conference on Environments for multi-agent systems III
Formalization of RBAC policy with object class hierarchy
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Authentication and access control using trust collaboration in pervasive grid environments
GPC'07 Proceedings of the 2nd international conference on Advances in grid and pervasive computing
Access control for workflow environment: the RTFW model
CSCWD'06 Proceedings of the 10th international conference on Computer supported cooperative work in design III
An architecture approach to dynamic policy in RBAC
CSCWD'06 Proceedings of the 10th international conference on Computer supported cooperative work in design III
A generic framework for context-based distributed authorizations
CONTEXT'03 Proceedings of the 4th international and interdisciplinary conference on Modeling and using context
Platform for enterprise privacy practices: privacy-enabled management of customer data
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Towards security and privacy for pervasive computing
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
An agency-based framework for electronic business
CIA'99 Proceedings of the 3rd international conference on Cooperative information agents III
Applying RBAC providing restricted permission inheritance to a corporate web environment
APWeb'03 Proceedings of the 5th Asia-Pacific web conference on Web technologies and applications
Analysis of ANSI RBAC Support in COM+
Computer Standards & Interfaces
Dynamic event-based access control as term rewriting
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
A spatio-temporal role-based access control model
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Context-aware security management system for pervasive computing environment
CONTEXT'07 Proceedings of the 6th international and interdisciplinary conference on Modeling and using context
On flexible modeling of history-based access control policies for XML documents
KES'07/WIRN'07 Proceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part III
Establishing RBAC-based secure interoperability in decentralized multi-domain environments
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
Role-based scheduling and synchronization algorithms to prevent illegal information flow
NBiS'07 Proceedings of the 1st international conference on Network-based information systems
A composite-service authorization prediction platform for grid environment
CDVE'07 Proceedings of the 4th international conference on Cooperative design, visualization, and engineering
Enforcement of integrated security policy in trusted operating systems
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
An OS security protection model for defeating attacks from network
ICISS'07 Proceedings of the 3rd international conference on Information systems security
Enforcing P3P policies using a digital rights management system
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Refinement for administrative policies
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Answering queries based on imprecision and uncertainty trade-offs in numeric databases
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Architecture for data collection in database intrusion detection systems
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
A role and attribute based access control system using semantic web technologies
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
Declarative process modeling with business vocabulary and business rules
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems - Volume Part I
Management advantages of object classification in role-based access control (RBAC)
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Multi-key hierarchical identity-based signatures
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
Enterprise application framework for constructing secure RFID application
ICHIT'06 Proceedings of the 1st international conference on Advances in hybrid information technology
Context RBAC/MAC access control for ubiquitous environment
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
A policy based approach to managing shared data in dynamic collaborations
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Managing risks in RBAC employed distributed environments
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
STARBAC: spatiotemporal role based access control
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Implementation of LSM-based RBAC module for embedded system
WISA'07 Proceedings of the 8th international conference on Information security applications
Dynamic access control research for inter-operation in multi-domain environment based on risk
WISA'07 Proceedings of the 8th international conference on Information security applications
A compositional multiple policies operating system security model
WISA'07 Proceedings of the 8th international conference on Information security applications
A system architecture for history-based access control for XML documents
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Specifying process-aware access control rules in SBVR
RuleML'07 Proceedings of the 2007 international conference on Advances in rule interchange and applications
ECOOP'07 Proceedings of the 2007 conference on Object-oriented technology
The separation of duty with privilege calculus
RSKT'08 Proceedings of the 3rd international conference on Rough sets and knowledge technology
Mediator-free secure policy interoperation of exclusively-trusted multiple domains
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Managing socio-technical interactions in healthcare systems
BPM'07 Proceedings of the 2007 international conference on Business process management
A formal framework for adaptive access control models
Journal on data semantics IX
Combination of duty and historical constraints in role-based access control
IIT'09 Proceedings of the 6th international conference on Innovations in information technology
Modeling of the role-based access control policy with constraints using description logic
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Privacy-aware role-based access control
ACM Transactions on Information and System Security (TISSEC)
The role mining problem: A formal perspective
ACM Transactions on Information and System Security (TISSEC)
An effective access control approach to support web service security
Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services
Authorization control in collaborative healthcare systems
Journal of Theoretical and Applied Electronic Commerce Research
Towards formal specification and verification of a role-based authorization engine using JML
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems
Towards a personalized privacy management framework
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems
Component-based security policy design with colored Petri nets
Semantics and algebraic specification
Proceedings of the 15th ACM symposium on Access control models and technologies
Role-based access control (RBAC) in Java via proxy objects using annotations
Proceedings of the 15th ACM symposium on Access control models and technologies
Proceedings of the 15th ACM symposium on Access control models and technologies
Enforcing spatial constraints for mobile RBAC systems
Proceedings of the 15th ACM symposium on Access control models and technologies
Capability-based delegation model in RBAC
Proceedings of the 15th ACM symposium on Access control models and technologies
A card requirements language enabling privacy-preserving access control
Proceedings of the 15th ACM symposium on Access control models and technologies
An access control model for mobile physical objects
Proceedings of the 15th ACM symposium on Access control models and technologies
Towards session-aware RBAC administration and enforcement with XACML
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
Dynamic enforcement of abstract separation of duty constraints
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
A privacy preservation model for facebook-style social network systems
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Set covering problems in role-based access control
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
A universal access control method based on host identifiers for Future Internet
Computers & Mathematics with Applications
A security framework for a workflow-based grid development platform
Computer Standards & Interfaces
A role-based protocol for secure multicast communications in mobile ad hoc networks
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
Modeling location attributes using XACML-RBAC model
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
A purpose-based privacy-aware system using privacy data graph
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
Design of RBAC-based secure KAgent framework for home network applications
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
A General Framework for Web Content Filtering
World Wide Web
Adaptive security management model in the cloud computing environment
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Optimizing a policy authoring framework for security and privacy policies
Proceedings of the Sixth Symposium on Usable Privacy and Security
Integrating GSTRBAC spatial constraints in X-GTRBAC
Proceedings of the 7th International Conference on Frontiers of Information Technology
Constructing authorization systems using assurance management framework
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Secure attribute-based systems
Journal of Computer Security
Architectural mismatch issues in identity management deployment
Proceedings of the Fourth European Conference on Software Architecture: Companion Volume
Geospatial data cyber-infrastructure based on geology metadata standard and web service
CAR'10 Proceedings of the 2nd international Asia conference on Informatics in control, automation and robotics - Volume 3
A calculus for the qualitative risk assessment of policy override authorization
Proceedings of the 3rd international conference on Security of information and networks
A hybrid trust management system for automated fine-grained access control
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Multi-domain trust management in variable-threat environments: a user-centric model
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
New role-based access control in ubiquitous e-business environment
Journal of Intelligent Manufacturing
Privacy-aware access control with generalization boundaries
ACSC '09 Proceedings of the Thirty-Second Australasian Conference on Computer Science - Volume 91
Access control: what is required in business collaboration?
ADC '09 Proceedings of the Twentieth Australasian Conference on Australasian Database - Volume 92
User interface models for the cloud
UIST '10 Adjunct proceedings of the 23nd annual ACM symposium on User interface software and technology
Detecting insider activity using enhanced directory virtualization
Proceedings of the 2010 ACM workshop on Insider threats
Access management in the ATLAS TDAQ
RTC'05 Proceedings of the 14th IEEE-NPSS conference on Real time
Enforcing trust in embedded systems using models
Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems
An interoperation framework for secure collaboration among organizations
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Enabling decentralised management through federation
Computer Networks: The International Journal of Computer and Telecommunications Networking
Role-based access control for a Grid system using OGSA-DAI and Shibboleth
The Journal of Supercomputing
Role mining in the presence of noise
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Satisfiability and Resiliency in Workflow Authorization Systems
ACM Transactions on Information and System Security (TISSEC)
Infringo ergo sum: when will software engineering support infringements?
Proceedings of the FSE/SDP workshop on Future of software engineering research
Dynamic authorisation policies for event-based task delegation
CAiSE'10 Proceedings of the 22nd international conference on Advanced information systems engineering
Service dependencies in information systems security
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Group-centric models for secure and agile information sharing
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Credential chain discovery in RTTtrust management language
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Access control in personal localized semantic information spaces
ruSMART/NEW2AN'10 Proceedings of the Third conference on Smart Spaces and next generation wired, and 10th international conference on Wireless networking
Building multi-agent systems for workflow enactment and exception handling
COIN'09 Proceedings of the 5th international conference on Coordination, organizations, institutions, and norms in agent systems
Automated detection of least privilege violations in software architectures
ECSA'10 Proceedings of the 4th European conference on Software architecture
Identity management mismatch challenges in the Danish municipality administration system
ECSA'10 Proceedings of the 4th European conference on Software architecture
A service dependency model for cost-sensitive intrusion response
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
SecurOntology: A semantic web access control framework
Computer Standards & Interfaces
A scalable authorization approach for grid system environments
CTS'05 Proceedings of the 2005 international conference on Collaborative technologies and systems
Incorporating social-cultural contexts in role engineering: an activity theoretic approach
International Journal of Business Information Systems
The Knowledge Engineering Review
Conceptual model for online auditing
Decision Support Systems
Towards automatic update of access control policy
LISA'10 Proceedings of the 24th international conference on Large installation system administration
Automating security configuration and administration: an access control perspective
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
Baaz: a system for detecting access control misconfigurations
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
An agent and RBAC model to secure cooperative information systems
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
Mining RBAC roles under cardinality constraint
ICISS'10 Proceedings of the 6th international conference on Information systems security
Detection of anomalous insiders in collaborative environments via relational analysis of access logs
Proceedings of the first ACM conference on Data and application security and privacy
MyABDAC: compiling XACML policies for attribute-based database access control
Proceedings of the first ACM conference on Data and application security and privacy
An empirical assessment of approaches to distributed enforcement in role-based access control (RBAC)
Proceedings of the first ACM conference on Data and application security and privacy
Relationship-based access control: protection model and policy language
Proceedings of the first ACM conference on Data and application security and privacy
An intelligent information sharing control system for dynamic collaborations
Proceedings of the 8th International Conference on Frontiers of Information Technology
RAR: A role-and-risk based flexible framework for secure collaboration
Future Generation Computer Systems
Security validation of business processes via model-checking
ESSoS'11 Proceedings of the Third international conference on Engineering secure software and systems
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems - Volume Part I
Managing conflict of interest in service composition
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems - Volume Part I
Role models—implementation-based approaches to using roles
Software—Practice & Experience
Detecting and resolving policy misconfigurations in access-control systems
ACM Transactions on Information and System Security (TISSEC)
Authorization recycling in hierarchical RBAC systems
ACM Transactions on Information and System Security (TISSEC)
Benefits of Location-Based Access Control: A Literature Study
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
BABAC: An Access Control Framework for Network Virtualization Using User Behaviors and Attributes
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Modeling process-related RBAC models with extended UML activity models
Information and Software Technology
Modeling and evaluating information leakage caused by inferences in supply chains
Computers in Industry
Coordinating e-health systems with TuCSoN semantic tuple centres
ACM SIGAPP Applied Computing Review
MIRAGE: a management tool for the analysis and deployment of network security policies
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Protecting critical infrastructures while preserving each organization's autonomy
ICDCIT'11 Proceedings of the 7th international conference on Distributed computing and internet technology
Semi-automatic synthesis of security policies by invariant-guided abduction
FAST'10 Proceedings of the 7th International conference on Formal aspects of security and trust
Cryptographic enforcement of role-based access control
FAST'10 Proceedings of the 7th International conference on Formal aspects of security and trust
Efficient symbolic automated analysis of administrative attribute-based RBAC-policies
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
MundoMessage: enabling trustworthy ubiquitous emergency communication
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
Authentication and access control in RFID based logistics-customs clearance service platform
International Journal of Automation and Computing
Integrating constraints to support legally flexible business processes
Information Systems Frontiers
Access Control for Databases: Concepts and Systems
Foundations and Trends in Databases
Journal of Systems Architecture: the EUROMICRO Journal
Role inheritance with object-based DSD
International Journal of Internet Technology and Secured Transactions
An approach for implementation of RBAC models with context constraint to business process systems
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Study on role-based access control model for web services and its application
TELE-INFO'06 Proceedings of the 5th WSEAS international conference on Telecommunications and informatics
Using VCL as an aspect-oriented approach to requirements modelling
Transactions on aspect-oriented software development VII
Optimistic access control for distributed collaborative editors
Proceedings of the 2011 ACM Symposium on Applied Computing
Editorial: Using OWL and SWRL to represent and reason with situation-based access control policies
Data & Knowledge Engineering
Types for security in a mobile world
TGC'05 Proceedings of the 1st international conference on Trustworthy global computing
Using VCL as an aspect-oriented approach to requirements modelling
Transactions on aspect-oriented software development VII
Evaluating access control of open source electronic health record systems
Proceedings of the 3rd Workshop on Software Engineering in Health Care
Mixing privacy with role-based access control
Proceedings of The Fourth International C* Conference on Computer Science and Software Engineering
Environment programming in multi-agent systems: an artifact-based perspective
Autonomous Agents and Multi-Agent Systems
Reasoning about dynamic delegation in role based access control systems
DASFAA'11 Proceedings of the 16th international conference on Database systems for advanced applications - Volume Part I
QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata
The VLDB Journal — The International Journal on Very Large Data Bases
Deriving role engineering artifacts from business processes and scenario models
Proceedings of the 16th ACM symposium on Access control models and technologies
An integrated approach for identity and access management in a SOA context
Proceedings of the 16th ACM symposium on Access control models and technologies
Relationship-based access control policies and their policy languages
Proceedings of the 16th ACM symposium on Access control models and technologies
An authorization scheme for version control systems
Proceedings of the 16th ACM symposium on Access control models and technologies
Integrating business process modelling and ERP role engineering
International Journal of Business Information Systems
Types for role-based access control of dynamic web data
WFLP'10 Proceedings of the 19th international conference on Functional and constraint logic programming
A flexible and secure access control scheme using social behavior in real world
Journal of Mobile Multimedia
Role-based secure inter-operation and resource usage management in mobile grid systems
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Journal of Computer and System Sciences
Role prediction using electronic medical record system audits
HealthSec'11 Proceedings of the 2nd USENIX conference on Health security and privacy
Proactive defense of insider threats through authorization management
Proceedings of 2011 international workshop on Ubiquitous affective awareness and intelligent interaction
A secure and efficient role-based access policy towards cryptographic cloud storage
WAIM'11 Proceedings of the 12th international conference on Web-age information management
Teaching access control with domain type enforcement
Journal of Computing Sciences in Colleges
Public process management: a method for introducing standard business reporting
Proceedings of the 12th Annual International Digital Government Research Conference: Digital Government Innovation in Challenging Times
Policy analysis for Administrative Role-Based Access Control
Theoretical Computer Science
Socially constructed trust for distributed authorization
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Modularisation in maude of parametrized RBAC for row level access control
ADBIS'11 Proceedings of the 15th international conference on Advances in databases and information systems
Group-Centric Secure Information-Sharing Models for Isolated Groups
ACM Transactions on Information and System Security (TISSEC)
Adoption of information technology policies in the tourism sector in the era of WEB2.0
WISS'10 Proceedings of the 2010 international conference on Web information systems engineering
Enabling privacy-preserving semantic presence in instant messaging systems
CONTEXT'11 Proceedings of the 7th international and interdisciplinary conference on Modeling and using context
Securing electronic medical records using attribute-based encryption on mobile devices
Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
Automatic error finding in access-control policies
Proceedings of the 18th ACM conference on Computer and communications security
Proceedings of the VLDB Endowment
An auto-delegation mechanism for access control systems
STM'10 Proceedings of the 6th international conference on Security and trust management
Automated symbolic analysis of ARBAC-policies
STM'10 Proceedings of the 6th international conference on Security and trust management
Modelling role hierarchy structure using the Formal Concept Analysis
Annales UMCS, Informatica
Combining UML, ASTD and B for the formal specification of an access control filter
Innovations in Systems and Software Engineering
Location-based access control systems for mobile users: concepts and research directions
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
OTM'11 Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems - Volume Part I
Trust management languages and complexity
OTM'11 Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems - Volume Part II
Dealing with collaborative tasks in process mashups
Proceedings of the 5th International Workshop on Web APIs and Service Mashups
Journal of Computer and System Sciences
Eyeing your exposure: quantifying and controlling information sharing for improved privacy
Proceedings of the Seventh Symposium on Usable Privacy and Security
Delegation in a distributed healthcare context: a survey of current approaches
ISC'06 Proceedings of the 9th international conference on Information Security
A network security policy model and its realization mechanism
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
A verifiable formal specification for RBAC model with constraints of separation of duty
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Enforcing security policies for distributed objects applications
Proceedings of the 11th international conference on Security Protocols
An organisation infrastructure for multi-agent systems based on agent coordination contexts
AI*IA'05 Proceedings of the 9th conference on Advances in Artificial Intelligence
A security-oriented task scheduler for heterogeneous distributed systems
HiPC'06 Proceedings of the 13th international conference on High Performance Computing
A model transformation semantics and analysis methodology for SecureUML
MoDELS'06 Proceedings of the 9th international conference on Model Driven Engineering Languages and Systems
A Generative Programming Framework for Context-Aware CSCW Applications
ACM Transactions on Software Engineering and Methodology (TOSEM)
Credential-Based policies management in an access control framework protecting XML resources
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
Creating objects in the flexible authorization framework
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Consolidating the access control of composite applications and workflows
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Resolving information flow conflicts in RBAC systems
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Discretionary and mandatory controls for role-based administration
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
From business process choreography to authorization policies
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Access control coherence of information systems based on security constraints
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
Context-Role based access control for context-aware application
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Privacy-preserving electronic health records
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Poster: trans-organizational role-based access control
Proceedings of the 18th ACM conference on Computer and communications security
Poster: ESPOONERBAC: enforcing security policies in outsourced environments with encrypted RBAC
Proceedings of the 18th ACM conference on Computer and communications security
Prox-RBAC: a proximity-based spatially aware RBAC
Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Optimized workflow authorization in service oriented architectures
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
A conflict resolution methodology in a large-scale CSCD system
CSCWD'05 Proceedings of the 9th international conference on Computer Supported Cooperative Work in Design II
Flexible workflow incorporated with RBAC
CSCWD'05 Proceedings of the 9th international conference on Computer Supported Cooperative Work in Design II
λ-RBAC: programming with role-based access control
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Using contextual security policies for threat response
DIMVA'06 Proceedings of the Third international conference on Detection of Intrusions and Malware & Vulnerability Assessment
Person-Wise privacy level access control for personal information directory services
EUC'06 Proceedings of the 2006 international conference on Embedded and Ubiquitous Computing
Using description logic to determine seniority among RB-RBAC authorization rules
RSKT'06 Proceedings of the First international conference on Rough Sets and Knowledge Technology
Distributed access control for grid environments using trust management approach
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Balancing flexibility and security in adaptive process management systems
OTM'05 Proceedings of the 2005 Confederated international conference on On the Move to Meaningful Internet Systems - Volume >Part I
Access control model for inter-organizational grid virtual organizations
OTM'05 Proceedings of the 2005 OTM Confederated international conference on On the Move to Meaningful Internet Systems
Integrative security management for web-based enterprise applications
WAIM'05 Proceedings of the 6th international conference on Advances in Web-Age Information Management
A state-transfer-based dynamic policy approach for constraints in RBAC
WAIM'05 Proceedings of the 6th international conference on Advances in Web-Age Information Management
Specifying an access control model for ontologies for the semantic web
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Run-time agents as a means of reconciling flexibility and scalability of services
WRAC'05 Proceedings of the Second international conference on Radical Agent Concepts: innovative Concepts for Autonomic and Agent-Based Systems
Key management for role hierarchy in distributed systems
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Access control requirements for preventing insider threats
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Survey Paper: A survey on policy languages in network and security management
Computer Networks: The International Journal of Computer and Telecommunications Networking
Context data abstraction framework using RDF
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
RBAC-based access control for privacy preserving in semantic web
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
Considering privacy and effectiveness of authorization policies for shared electronic health records
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium
An approach for trusted interoperation in a multidomain environment
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
An access-control policy based on sharing resource management for a multi-domains environment
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Managing policies for dynamic spectrum access
AN'06 Proceedings of the First IFIP TC6 international conference on Autonomic Networking
Extracting global policies for efficient access control of XML documents
WISE'05 Proceedings of the 6th international conference on Web Information Systems Engineering
LoT-RBAC: a location and time-based RBAC model
WISE'05 Proceedings of the 6th international conference on Web Information Systems Engineering
Distributed credential chain discovery in trust-management with parameterized roles
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
The conflict detection between permission assignment constraints in role-based access control
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Trust-Based secure workflow path construction
ICSOC'05 Proceedings of the Third international conference on Service-Oriented Computing
An aspect-oriented approach to declarative access control for web applications
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
A model of XML access control with dual-level security views
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
A semantic context-aware access control in pervasive environments
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
Integrating legacy authorization systems into the grid: a case study leveraging azman and ADAM
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part I
A DDL based formal policy representation
PRIMA'06 Proceedings of the 9th Pacific Rim international conference on Agent Computing and Multi-Agent Systems
A dynamic access control model
Applied Intelligence
A relational database integrity framework for access control policies
Journal of Intelligent Information Systems
Realizing Model Transformation Chain interoperability
Software and Systems Modeling (SoSyM)
A DRBAC model based on context for smart and secure services in intelligent ubiquitous home
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Construction and use of role-ontology for task-based service navigation system
ISWC'06 Proceedings of the 5th international conference on The Semantic Web
Model checking of security-sensitive business processes
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
The research for spatial role-based access control model
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV
Environment-based coordination through coordination artifacts
E4MAS'04 Proceedings of the First international conference on Environments for Multi-Agent Systems
Design and implementation of an extended reference monitor for trusted operating systems
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Using π-calculus to formalize domain administration of RBAC
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
A flexible role-based delegation model using characteristics of permissions
DEXA'05 Proceedings of the 16th international conference on Database and Expert Systems Applications
Representation of extended RBAC model using UML language
SOFSEM'05 Proceedings of the 31st international conference on Theory and Practice of Computer Science
Enacting and deacting roles in agent programming
AOSE'04 Proceedings of the 5th international conference on Agent-Oriented Software Engineering
Efficient run-time solving of RBAC user authorization queries: pushing the envelope
Proceedings of the second ACM conference on Data and Application Security and Privacy
Role-based modelling of interactions in database applications
CAiSE'06 Proceedings of the 18th international conference on Advanced Information Systems Engineering
Role-based peer-to-peer model: capture global pseudonymity for privacy protection
WAIM '06 Proceedings of the 7th international conference on Advances in Web-Age Information Management
OS-DRAM: a delegation administration model in a decentralized enterprise environment
WAIM '06 Proceedings of the 7th international conference on Advances in Web-Age Information Management
Specifying and reasoning about dynamic access-control policies
IJCAR'06 Proceedings of the Third international joint conference on Automated Reasoning
Protecting user data in ubiquitous computing: towards trustworthy environments
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Task-Based access control for virtual organizations
FIDJI'04 Proceedings of the 4th international conference on Scientific Engineering of Distributed Java Applications
SEM'04 Proceedings of the 4th international conference on Software Engineering and Middleware
Security and trust requirements engineering
Foundations of Security Analysis and Design III
An infrastructural approach to secure interoperability of electronic IDs: the bridging backbone
EGOV'05 Proceedings of the 4th international conference on Electronic Government
A privacy enhanced role-based access control model for enterprises
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
A CORBA-Based dynamic reconfigurable middleware
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Secure model management operations for the web
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Trusted identity and session management using secure cookies
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
A flexible privilege management scheme for role graph model
PARA'04 Proceedings of the 7th international conference on Applied Parallel Computing: state of the Art in Scientific Computing
A framework for modeling organization structure in role engineering
PARA'04 Proceedings of the 7th international conference on Applied Parallel Computing: state of the Art in Scientific Computing
A user authentication model for the OSGi service platform
AsiaSim'04 Proceedings of the Third Asian simulation conference on Systems Modeling and Simulation: theory and applications
Name-Level approach for egress network access control
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Context-Aware access control mechanism for ubiquitous applications
AWIC'05 Proceedings of the Third international conference on Advances in Web Intelligence
Trust of medical devices, applications, and users in pervasive healthcare
Proceedings of the 4th International Conference on PErvasive Technologies Related to Assistive Environments
Feasibility study of software reengineering towards role-based access control
International Journal of Computer Applications in Technology
Inconsistency detection of authorization policies in distributed component environment
WISA'04 Proceedings of the 5th international conference on Information Security Applications
XML-Based revocation and delegation in a distributed environment
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
A semantic search conceptual model and application in security access control
ASWC'06 Proceedings of the First Asian conference on The Semantic Web
A contextual attribute-based access control model
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
Security on-demand architecture with multiple modules support
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
A practical aspect framework for enforcing fine-grained access control in web applications
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
A task-oriented access control model for WfMS
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
An efficient access control model for mobile ad-hoc communities
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
CBSE'05 Proceedings of the 8th international conference on Component-Based Software Engineering
A formal enforcement framework for role-based access control using aspect-oriented programming
MoDELS'05 Proceedings of the 8th international conference on Model Driven Engineering Languages and Systems
Safety problems in access control with temporal constraints
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
XML access control with policy matching tree
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Semantic access control model: a formal specification
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Specification and validation of authorisation constraints using UML and OCL
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
On scalability and modularisation in the modelling of network security systems
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Evaluating access control policies through model checking
ISC'05 Proceedings of the 8th international conference on Information Security
A formal definition for trust in distributed systems
ISC'05 Proceedings of the 8th international conference on Information Security
Emergency Access Authorization for Personally Controlled Online Health Care Data
Journal of Medical Systems
A survey of security issue in multi-agent systems
Artificial Intelligence Review
Representation and reasoning on RBAC: a description logic approach
ICTAC'05 Proceedings of the Second international conference on Theoretical Aspects of Computing
Conflict of interest in the administrative role graph model
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
ICGT'06 Proceedings of the Third international conference on Graph Transformations
Delegation in role-based access control
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Key derivation algorithms for monotone access structures in cryptographic file systems
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Security analysis and validation for access control in multi-domain environment based on risk
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
Representation and reasoning on role-based access control policies with conceptual graphs
ICCS'06 Proceedings of the 14th international conference on Conceptual Structures: inspiration and Application
Detecting information leakage in updating XML documents of fine-grained access control
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
Role-based serializability for distributed object systems
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
Modeling and inferring on role-based access control policies using data dependencies
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
Formal methods in the security business: exotic flowers thriving in an expanding niche
FM'06 Proceedings of the 14th international conference on Formal Methods
ShareEnabler: policy-driven access management for ad-hoc collaborative sharing
EDBT'06 Proceedings of the 2006 international conference on Current Trends in Database Technology
FORBAC: a flexible organisation and role-based access control model for secure information systems
ADVIS'06 Proceedings of the 4th international conference on Advances in Information Systems
Web application security gateway with java non-blocking IO
NGITS'06 Proceedings of the 6th international conference on Next Generation Information Technologies and Systems
Spatial context in role-based access control
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
O2O: virtual private organizations to manage security policy interoperability
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Towards a formal specification method for enterprise information system security
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Security policy enforcement through refinement process
B'07 Proceedings of the 7th international conference on Formal Specification and Development in B
Integration of security policy into system modeling
B'07 Proceedings of the 7th international conference on Formal Specification and Development in B
Dynamic security rules for geo data
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
ASRBAC: a security administration model for mobile autonomic networks (MAutoNets)
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Model-Driven security policy deployment: property oriented approach
ESSoS'10 Proceedings of the Second international conference on Engineering Secure Software and Systems
Flow based interpretation of access control: detection of illegal information flows
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Improving the configuration management of large network security systems
DSOM'05 Proceedings of the 16th IFIP/IEEE Ambient Networks international conference on Distributed Systems: operations and Management
New concept of authority range for flexible management of role hierarchy
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Securing publish/subscribe for multi-domain systems
Middleware'05 Proceedings of the ACM/IFIP/USENIX 6th international conference on Middleware
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Authorization and trust enhanced security for distributed applications
ICISS'05 Proceedings of the First international conference on Information Systems Security
Protection of relationships in XML documents with the XML-BB model
ICISS'05 Proceedings of the First international conference on Information Systems Security
ICISS'05 Proceedings of the First international conference on Information Systems Security
A standards-based approach for supporting dynamic access policies for a federated digital library
ICADL'05 Proceedings of the 8th international conference on Asian Digital Libraries: implementing strategies and sharing experiences
Two-Stage access control model for XML security
ICADL'05 Proceedings of the 8th international conference on Asian Digital Libraries: implementing strategies and sharing experiences
Role based access control for knowledge sharing in remote areas
CIMMACS'11/ISP'11 Proceedings of the 10th WSEAS international conference on Computational Intelligence, Man-Machine Systems and Cybernetics, and proceedings of the 10th WSEAS international conference on Information Security and Privacy
Proceedings of the 50th Annual Southeast Regional Conference
Access control using active rules
BNCOD'10 Proceedings of the 27th British national conference on Data Security and Security Data
Flexible and dynamic consent-capturing
iNetSec'11 Proceedings of the 2011 IFIP WG 11.4 international conference on Open Problems in Network Security
Implementation of access control model for distributed information systems using usage control
SIIS'11 Proceedings of the 2011 international conference on Security and Intelligent Information Systems
A map-layer-based access control model
WISA'11 Proceedings of the 12th international conference on Information Security Applications
Authorization in cross-border eHealth systems
Information Systems Frontiers
Formal specification and validation of security policies
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
A semantic approach for access control in web services
EuroWeb'02 Proceedings of the 2002 international conference on EuroWeb
Modeling and mining of learnflows
Transactions on Petri Nets and Other Models of Concurrency V
Context-aware role mining for mobile service recommendation
Proceedings of the 27th Annual ACM Symposium on Applied Computing
A policy-based decentralized authorization management framework for cloud computing
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Patterns for constructing CSCW applications in TINA
Computer Communications
A healthcare information system with augmented access controls
APWeb'12 Proceedings of the 14th Asia-Pacific international conference on Web Technologies and Applications
Adaptive access control enforcement in social network using aspect weaving
DASFAA'12 Proceedings of the 17th international conference on Database Systems for Advanced Applications
Applying authorization to intranets: architectures, issues and APIs
Computer Communications
Policy-by-example for online social networks
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
The authorization leap from rights to attributes: maturation or chaos?
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
A framework integrating attribute-based policies into role-based access control
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
PlexC: a policy language for exposure control
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
SecTTS: A secure track & trace system for RFID-enabled supply chains
Computers in Industry
Securing design checking service for the regulation-based product design
Computers in Industry
Computers & Mathematics with Applications
A role-involved purpose-based access control model
Information Systems Frontiers
Logical approaches to authorization policies
Logic Programs, Norms and Action
Mutually exclusive permissions in RBAC
International Journal of Internet Technology and Secured Transactions
The semantics of role-based trust management languages
CEE-SET'09 Proceedings of the 4th IFIP TC 2 Central and East European conference on Advances in Software Engineering Techniques
Risk-Aware role-based access control
STM'11 Proceedings of the 7th international conference on Security and Trust Management
Automated analysis of infinite state workflows with access control policies
STM'11 Proceedings of the 7th international conference on Security and Trust Management
A new RBAC based access control model for cloud computing
GPC'12 Proceedings of the 7th international conference on Advances in Grid and Pervasive Computing
Performance analysis for workflow management systems under role-based authorization control
GPC'12 Proceedings of the 7th international conference on Advances in Grid and Pervasive Computing
Minimizing insider misuse through secure Identity Management
Security and Communication Networks
Enhancing directory virtualization to detect insider activity
Security and Communication Networks
Authenticated and persistent skip graph: a data structure for cloud based data-centric applications
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
ROAC: a role-oriented access control model
WISTP'12 Proceedings of the 6th IFIP WG 11.2 international conference on Information Security Theory and Practice: security, privacy and trust in computing systems and ambient intelligent ecosystems
Roles, an interdisciplinary perspective
Applied Ontology - Roles, an interdisciplinary perspective
Automated and efficient analysis of role-based access control with attributes
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
A unified attribute-based access control model covering DAC, MAC and RBAC
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
From MDM to DB2: a case study of security enforcement migration
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
ICAF: a context-aware framework for access control
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Recovering role-based access control security models from dynamic web applications
ICWE'12 Proceedings of the 12th international conference on Web Engineering
Comprehensive two-level analysis of role-based delegation and revocation policies with UML and OCL
Information and Software Technology
Challenging issues of UCON in modern computing environments
Proceedings of the Fifth Balkan Conference in Informatics
HealthSec'12 Proceedings of the 3rd USENIX conference on Health Security and Privacy
DTEvisual: a visualization system for teaching access control using Domain Type Enforcement
Journal of Computing Sciences in Colleges
Privacy in mobile technology for personal healthcare
ACM Computing Surveys (CSUR)
Declarative access policies based on objects, relationships, and states
Proceedings of the 3rd annual conference on Systems, programming, and applications: software for humanity
RBAC-Matrix-Based EMR Right Management System to Improve HIPAA Compliance
Journal of Medical Systems
Secure Dynamic Access Control Scheme of PHR in Cloud Computing
Journal of Medical Systems
Recognition of authority in virtual organisations
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Enhancing optimistic access controls with usage control
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Situation-based policy enforcement
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Conditional privacy-aware role based access control
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Satisfiability and resiliency in workflow systems
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Ontology based hybrid access control for automatic interoperation
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Access control for semantic data federations in industrial product-lifecycle management
Computers in Industry
Architecture of context-aware integrated security management systems for smart home environment
APNOMS'07 Proceedings of the 10th Asia-Pacific conference on Network Operations and Management Symposium: managing next generation networks and services
Reusable graph transformation templates
AGTIVE'11 Proceedings of the 4th international conference on Applications of Graph Transformations with Industrial Relevance
OSDM: an organizational supervised delegation model for RBAC
ISC'12 Proceedings of the 15th international conference on Information Security
RABAC: role-centric attribute-based access control
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
Improving Mandatory Access Control for HPC clusters
Future Generation Computer Systems
The need for application-aware access control evaluation
Proceedings of the 2012 workshop on New security paradigms
A role-based administration model for attributes
Proceedings of the First International Workshop on Secure and Resilient Architectures and Systems
Towards provenance and risk-awareness in social computing
Proceedings of the First International Workshop on Secure and Resilient Architectures and Systems
Toward a model-driven access-control enforcement mechanism for pervasive systems
Proceedings of the Workshop on Model-Driven Security
Proceedings of the Workshop on Model-Driven Security
PASOAC-Net: a petri-net model to manage authorization in service-based business process
ICSOC'12 Proceedings of the 10th international conference on Service-Oriented Computing
Efficient ciphertext-policy attribute based encryption with hidden policy
IDCS'12 Proceedings of the 5th international conference on Internet and Distributed Computing Systems
Context-awareness: exploring the imperative shared context of security and ubiquitous computing
Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services
Symbolic backward reachability with effectively propositional logic
Formal Methods in System Design
Fairness and access control for mobile P2P auctions over MANETs
Journal of Theoretical and Applied Electronic Commerce Research
Context-Aware Identity Management in Pervasive Ad-hoc Environments
International Journal of Advanced Pervasive and Ubiquitous Computing
Federation and security aspects for the management of the EHR in italy
ADNTIIC'11 Proceedings of the Second international conference on Advances in New Technologies, Interactive Interfaces and Communicability
FENCE: continuous access control enforcement in dynamic data stream environments
Proceedings of the third ACM conference on Data and application security and privacy
A new approach for delegation in usage control
Proceedings of the third ACM conference on Data and application security and privacy
Information Systems and e-Business Management
Evaluating role based authorization programs
ISMIS'12 Proceedings of the 20th international conference on Foundations of Intelligent Systems
NSS'12 Proceedings of the 6th international conference on Network and System Security
A formal role-based access control model for security policies in multi-domain mobile networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Theorizing Information Security Success: Towards Secure E-Government
International Journal of Electronic Government Research
A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
International Journal of Information Security and Privacy
A Metadata-Based Approach for Unstructured Document Management in Organizations
Information Resources Management Journal
Mohawk: Abstraction-Refinement and Bound-Estimation for Verifying Access Control Policies
ACM Transactions on Information and System Security (TISSEC)
Nephele: Scalable Access Control for Federated File Services
Journal of Grid Computing
Policy analysis for self-administrated role-based access control
TACAS'13 Proceedings of the 19th international conference on Tools and Algorithms for the Construction and Analysis of Systems
Model-driven adaptive delegation
Proceedings of the 12th annual international conference on Aspect-oriented software development
CA-ABAC: Class Algebra Attribute-Based Access Control
WI-IAT '12 Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Volume 03
Heuristic safety analysis of access control models
Proceedings of the 18th ACM symposium on Access control models and technologies
Proceedings of the 18th ACM symposium on Access control models and technologies
Evolving role definitions through permission invocation patterns
Proceedings of the 18th ACM symposium on Access control models and technologies
HyXAC: a hybrid approach for XML access control
Proceedings of the 18th ACM symposium on Access control models and technologies
Interleaving tasks to improve performance: Users maximise the marginal rate of return
International Journal of Human-Computer Studies
Supporting entailment constraints in the context of collaborative web applications
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Generic support for RBAC break-glass policies in process-aware information systems
Proceedings of the 28th Annual ACM Symposium on Applied Computing
How to use attribute-based encryption to implement role-based access control in the cloud
Proceedings of the 2013 international workshop on Security in cloud computing
Role mining algorithm evaluation and improvement in large volume android applications
Proceedings of the first international workshop on Security in embedded systems and smartphones
On the Parameterized Complexity and Kernelization of the Workflow Satisfiability Problem
ACM Transactions on Information and System Security (TISSEC)
Usable object management approaches for online social networks
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Efficient and secure data storage operations for mobile cloud computing
Proceedings of the 8th International Conference on Network and Service Management
Consistency checking in privacy-aware access control
Proceedings of the 51st ACM Southeast Conference
A mechanism for achieving a bound on execution performance of process group to limit CPU abuse
The Journal of Supercomputing
Addressing security compatibility for multi-tenant cloud services
International Journal of Computer Applications in Technology
Model-based, event-driven programming paradigm for interactive web applications
Proceedings of the 2013 ACM international symposium on New ideas, new paradigms, and reflections on programming & software
Enforcing Minimum Necessary Access in Healthcare Through Integrated Audit and Access Control
Proceedings of the International Conference on Bioinformatics, Computational Biology and Biomedical Informatics
Reachability analysis for role-based administration of attributes
Proceedings of the 2013 ACM workshop on Digital identity management
DR BACA: dynamic role based access control for Android
Proceedings of the 29th Annual Computer Security Applications Conference
ICWE'13 Proceedings of the 13th international conference on Web Engineering
Enforcement of entailment constraints in distributed service-based business processes
Information and Software Technology
Toward mining of temporal roles
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
A model for trust-based access control and delegation in mobile clouds
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
Analysis of TRBAC with dynamic temporal role hierarchies
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
Over-Fitting and Error Detection for Online Role Mining
International Journal of Web Services Research
Securing data services: a security architecture design for private storage cloud based on HDFS
International Journal of Grid and Utility Computing
Fine-grained privacy control for the RFID middleware of EPCglobal networks
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems
A MAS for access control management in cooperative information systems
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems
Modelling context-aware RBAC models for mobile business processes
International Journal of Wireless and Mobile Computing
Mining Deviations from Patient Care Pathways via Electronic Medical Record System Audits
ACM Transactions on Management Information Systems (TMIS) - Special Issue on Informatics for Smart Health and Wellbeing
CAAC -- An Adaptive and Proactive Access Control Approach for Emergencies in Smart Infrastructures
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Consistency checking in access control
Proceedings of the 4th ACM conference on Data and application security and privacy
The Secure Authorization Model for Healthcare Information System
Journal of Medical Systems
Association-Based Active Access Control models with balanced scalability and flexibility
Computers in Industry
Contract RBAC in cloud computing
The Journal of Supercomputing
Future Generation Computer Systems
A semantic authorization model for pervasive healthcare
Journal of Network and Computer Applications
Information and Software Technology
The RBAC model and implementation architecture in multi-domain environment
Electronic Commerce Research
Ontology-based access control model for security policy reasoning in cloud computing
The Journal of Supercomputing
Journal of Computer Security - STM'10
Formal verification of security properties in trust management policy
Journal of Computer Security
Policy-driven role-based access management for ad-hoc collaboration
Journal of Computer Security
How to guarantee compliance between workflows and product lifecycles?
Information Systems
A type-theoretical approach for ontologies: The case of roles
Applied Ontology
Formal specification and management of security policies with collective group obligations
Journal of Computer Security
Towards a formal analysis of dynamic reconfiguration in WS-BPEL
Intelligent Decision Technologies
A Role Based Privacy-Aware Secure Routing Protocol for Wireless Mesh Networks
Wireless Personal Communications: An International Journal
Hi-index | 4.11 |
Since the 1970s, computer systems have featured multiple applications and served multiple users, leading to heightened awareness of data security issues. System administrators and software developers focused on different kinds of access control to ensure that only authorized users were given access to certain data or resources. One kind of access control that emerged is role-based access control (RBAC). A role is chiefly a semantic construct forming the basis of access control policy. With RBAC, system administrators create roles according to the job functions performed in a company or organization, grant permissions (access authorization) to those roles, and then assign users to the roles on the basis of their specific job responsibilities and qualifications. A role can represent specific task competency, such as that of a physician or a pharmacist. Or it can embody the authority and responsibility of, say, a project supervisor. Roles define both the specific individuals allowed to access resources and the extent to which resources are accessed. For example, an operator role might access all computer resources but not change access permissions; a security-officer role might change permissions but have no access to resources; and an auditor role might access only audit trails. Roles are used for system administration in such network operating systems as Novell's NetWare and Microsoft's Windows NT. This article explains why RBAC is receiving renewed attention as a method of security administration and review, describes a framework of four reference models the authors have developed to better understand RBAC and categorize different implementations, and discusses the use of RBAC to manage itself. The authors' framework separates the administration of RBAC from its access control functions.