Database security
Role-Based Access Control Models
Computer
Modeling mandatory access control in role-based security systems
Proceedings of the ninth annual IFIP TC11 WG11.3 working conference on Database security IX : status and prospects: status and prospects
Commercial integrity, roles and object orientation
Commercial integrity, roles and object orientation
Proceedings of the first ACM Workshop on Role-based access control
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Lattice-Based Access Control Models
Computer
Access Rights Administration in Role-Based Security Systems
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
Role Hierarchies and Constraints for Lattice-Based Access Controls
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Role based access control on MLS systems without kernel changes
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
The role graph model and conflict of interest
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
An access control model for simplifying constraint expression
Proceedings of the 7th ACM conference on Computer and communications security
Configuring role-based access control to enforce mandatory and discretionary access control policies
ACM Transactions on Information and System Security (TISSEC)
Practical safety in flexible access control models
ACM Transactions on Information and System Security (TISSEC)
Integrating role graphs: a tool for security integration
Data & Knowledge Engineering - Data and applications security
An approach to secure information flow on Object Oriented Role-based Access Control model
Proceedings of the 2003 ACM symposium on Applied computing
Embedding role-based access control model in object-oriented systems to protect privacy
Journal of Systems and Software
Comparing the expressive power of access control models
Proceedings of the 11th ACM conference on Computer and communications security
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
Proceedings of the thirteenth ACM international conference on Information and knowledge management
Providing flexible access control to an information flow control model
Journal of Systems and Software
An information flow control model for C applications based on access control lists
Journal of Systems and Software
Managing role relationships in an information flow control model
Journal of Systems and Software
A theory for comparing the expressive power of access control models
Journal of Computer Security
An integrated model for access control and information flow requirements
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Security-conscious XML indexing
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
The research for spatial role-based access control model
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV
Enforcing semantics-aware security in multimedia surveillance
Journal on Data Semantics II
Hi-index | 0.00 |