Specification and execution of transactional workflows
Modern database systems
An overview of workflow management: from process modeling to workflow automation infrastructure
Distributed and Parallel Databases - Special issue on software support for work flow management
Rationale for the RBAC96 family of access control models
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Characteristics of role-based access control
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Towards a task-based paradigm for flexible and adaptable access control in distributed applications
NSPW '92-93 Proceedings on the 1992-1993 workshop on New security paradigms
Protection in operating systems
Communications of the ACM
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
An Authorization Model for Workflows
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Proceedings of the tenth ACM Conference on Hypertext and hypermedia : returning to our diverse roots: returning to our diverse roots
Managing trust between collaborating companies using outsourced role based access control
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
An object-oriented model of access control based on role
ACM SIGSOFT Software Engineering Notes
Flexible team-based access control using contexts
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
A model of OASIS role-based access control and its support for active security
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Models for coalition-based access control (CBAC)
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A role-based delegation framework for healthcare information systems
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A model of OASIS role-based access control and its support for active security
ACM Transactions on Information and System Security (TISSEC)
A Flexible Access Control Model for Multimedia Medical Image Security
PCM '01 Proceedings of the Second IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Task-Role Based Access Control (T-RBAC): An Improved Access Control Model for Enterprise Environment
DEXA '00 Proceedings of the 11th International Conference on Database and Expert Systems Applications
A Flexible Role-Based Access Control Model for Multimedia Medical Image Database Systems
ISC '01 Proceedings of the 4th International Conference on Information Security
An approach to engineer and enforce context constraints in an RBAC environment
Proceedings of the eighth ACM symposium on Access control models and technologies
Static verification of security requirements in role based CSCW systems
Proceedings of the eighth ACM symposium on Access control models and technologies
State-dependent security decisions for distributed object-systems
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Task-role-based access control model
Information Systems
Role-Based Access Controls: Status, Dissemination, and Prospects for Generic Security Mechanisms
Electronic Commerce Research
An integrated approach to engineer and enforce context constraints in RBAC environments
ACM Transactions on Information and System Security (TISSEC)
Access control in collaborative systems
ACM Computing Surveys (CSUR)
Fine-grained role-based delegation in presence of the hybrid role hierarchy
Proceedings of the eleventh ACM symposium on Access control models and technologies
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
ACM Transactions on Information and System Security (TISSEC)
On spatio-temporal constraints and inheritance in role-based access control
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Context-aware role-based access control in pervasive computing systems
Proceedings of the 13th ACM symposium on Access control models and technologies
Access control by action control
Proceedings of the 13th ACM symposium on Access control models and technologies
Role engineering: From design to evolution of security schemes
Journal of Systems and Software
Patterns and Pattern Diagrams for Access Control
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Supporting dynamic administration of RBAC in web-based collaborative applications during run-time
International Journal of Information and Computer Security
Dynamic, context-aware, least-privilege grid delegation
GRID '07 Proceedings of the 8th IEEE/ACM International Conference on Grid Computing
Action Control by Term Rewriting
Electronic Notes in Theoretical Computer Science (ENTCS)
Law-aware access control for international financial environments
Proceedings of the Eighth ACM International Workshop on Data Engineering for Wireless and Mobile Access
Role based access control for a medical database
SEA '07 Proceedings of the 11th IASTED International Conference on Software Engineering and Applications
Management advantages of object classification in role-based access control (RBAC)
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
A security framework for a workflow-based grid development platform
Computer Standards & Interfaces
Security policies in distributed CSCW and workflow systems
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Proceedings of the first ACM conference on Data and application security and privacy
Modeling process-related RBAC models with extended UML activity models
Information and Software Technology
Integrating constraints to support legally flexible business processes
Information Systems Frontiers
Dynamic access control administration for collaborative applications
ICCOMP'06 Proceedings of the 10th WSEAS international conference on Computers
Types for security in a mobile world
TGC'05 Proceedings of the 1st international conference on Trustworthy global computing
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
From business process choreography to authorization policies
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Context data abstraction framework using RDF
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
LoT-RBAC: a location and time-based RBAC model
WISE'05 Proceedings of the 6th international conference on Web Information Systems Engineering
A relational database integrity framework for access control policies
Journal of Intelligent Information Systems
Task-Based access control for virtual organizations
FIDJI'04 Proceedings of the 4th international conference on Scientific Engineering of Distributed Java Applications
Spatial context in role-based access control
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Authorization in cross-border eHealth systems
Information Systems Frontiers
Adaptive access control enforcement in social network using aspect weaving
DASFAA'12 Proceedings of the 17th international conference on Database Systems for Advanced Applications
Logical approaches to authorization policies
Logic Programs, Norms and Action
On the Prevention of Fraud and Privacy Exposure in Process Information Flow
INFORMS Journal on Computing
Context-awareness: exploring the imperative shared context of security and ubiquitous computing
Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services
Information Systems and e-Business Management
An information flow control meta-model
Proceedings of the 18th ACM symposium on Access control models and technologies
Modelling context-aware RBAC models for mobile business processes
International Journal of Wireless and Mobile Computing
Future Generation Computer Systems
Hi-index | 0.00 |