Role-Based Access Control Models
Computer
The ARBAC97 model for role-based administration of roles: preliminary description and outline
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Specifying and managing role-based access control within a corporate intranet
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Characteristics of role-based access control
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Constraints for role-based access control
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Requirements of role-based access control for collaborative systems
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Decentralized user-role assignment for Web-based intranets
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
The role graph model and conflict of interest
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
Role-based access control on the web
ACM Transactions on Information and System Security (TISSEC)
Building systems that flexibly control downloaded executable context
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Security policies in distributed CSCW and workflow systems
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Types for security in a mobile world
TGC'05 Proceedings of the 1st international conference on Trustworthy global computing
Hi-index | 0.00 |