Extending access control with duties—realized by active mechanisms
Results of the Sixth Working Conference of IFIP Working Group 11.3 on Database Security on Database security, VI : status and prospects: status and prospects
Role-Based Access Control Models
Computer
A Model of Integrity Separation of Duty for a Trusted DBMS
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
The role graph model and conflict of interest
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
A role-based access control model and reference implementation within a corporate intranet
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
The RSL99 language for role-based separation of duty constraints
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Managing trust between collaborating companies using outsourced role based access control
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
The NIST model for role-based access control: towards a unified standard
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Integrated constraints and inheritance in DTAC
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
An access control model for simplifying constraint expression
Proceedings of the 7th ACM conference on Computer and communications security
Panel: which access control technique will provide the greatest overall benefit
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
A model of OASIS role-based access control and its support for active security
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
An argument for the role-based access control model
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Role-based authorization constraints specification
ACM Transactions on Information and System Security (TISSEC)
Practical safety in flexible access control models
ACM Transactions on Information and System Security (TISSEC)
TRBAC: A temporal role-based access control model
ACM Transactions on Information and System Security (TISSEC)
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
A lightweight approach to specification and analysis of role-based access control extensions
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A model of OASIS role-based access control and its support for active security
ACM Transactions on Information and System Security (TISSEC)
A Knowledge-Based Approach to Internet Authorizations
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Building Groupwares over Duplicated Object Systems
CRIWG '02 Proceedings of the 8th International Workshop on Groupware: Design, Implementation and Use
Data Protection by Logic Programming
CL '00 Proceedings of the First International Conference on Computational Logic
Dependencies and separation of duty constraints in GTRBAC
Proceedings of the eighth ACM symposium on Access control models and technologies
Specification and Classification of Role-based Authorization Policies
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Task-role-based access control model
Information Systems
On permissions, inheritance and role hierarchies
Proceedings of the 10th ACM conference on Computer and communications security
Proceedings of the 2004 ACM symposium on Applied computing
Embedding role-based access control model in object-oriented systems to protect privacy
Journal of Systems and Software
Towards a formal model for security policies specification and validation in the selinux system
Proceedings of the ninth ACM symposium on Access control models and technologies
Separation of duties for access control enforcement in workflow environments
IBM Systems Journal - End-to-end security
On mutually-exclusive roles and separation of duty
Proceedings of the 11th ACM conference on Computer and communications security
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Constraint generation for separation of duty
Proceedings of the eleventh ACM symposium on Access control models and technologies
A model-checking approach to analysing organisational controls in a loan origination process
Proceedings of the eleventh ACM symposium on Access control models and technologies
GEO-RBAC: A spatially aware RBAC
ACM Transactions on Information and System Security (TISSEC)
On mutually exclusive roles and separation-of-duty
ACM Transactions on Information and System Security (TISSEC)
Visual modeling and formal specification of constraints of RBAC using semantic web technology
Knowledge-Based Systems
A Rule-Based Framework Using Role Patterns for Business Process Compliance
RuleML '08 Proceedings of the International Symposium on Rule Representation, Interchange and Reasoning on the Web
Comprehensive life cycle support for access rules in information systems: the CEOSIS project
Enterprise Information Systems - Towards Model-driven Service-oriented Enterprise Computing - 12th International IEEE EDOC Enterprise Computing Conference (EDOC 2008)
V-model approach for role engineering
ICCOMP'09 Proceedings of the WSEAES 13th international conference on Computers
A closer look to the V-model approach for role engineering
WSEAS Transactions on Computers
A formal framework for adaptive access control models
Journal on data semantics IX
Conceptual model for online auditing
Decision Support Systems
Role inheritance with object-based DSD
International Journal of Internet Technology and Secured Transactions
Flexible secure inter-domain interoperability through attribute conversion
Information Sciences: an International Journal
A verifiable formal specification for RBAC model with constraints of separation of duty
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
User-managed access control for health care systems
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
The conflict detection between permission assignment constraints in role-based access control
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
A relational database integrity framework for access control policies
Journal of Intelligent Information Systems
Conformance checking of RBAC policy and its implementation
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Mutually exclusive permissions in RBAC
International Journal of Internet Technology and Secured Transactions
Hi-index | 0.00 |