On hierarchical design of computer systems for critical applications
IEEE Transactions on Software Engineering - Special issue on reliability and safety in real-time process control
Object-oriented software engineering
Object-oriented software engineering
Object-oriented modeling and design
Object-oriented modeling and design
Role-Based Access Control Models
Computer
User Group Structures in Object-Oriented Database Authorization
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
Access Rights Administration in Role-Based Security Systems
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
Organization Models for Cooperative Office Applications
DEXA '94 Proceedings of the 5th International Conference on Database and Expert Systems Applications
Formal specification of real-time dependable systems
ICECCS '95 Proceedings of the 1st International Conference on Engineering of Complex Computer Systems
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Reflective authorization systems: possibilities, benefits, and drawbacks
Secure Internet programming
A scenario-driven role engineering process for functional RBAC roles
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Observations on the role life-cycle in the context of enterprise security management
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Using UMLsec and goal trees for secure systems development
Proceedings of the 2002 ACM symposium on Applied computing
UMLsec: Extending UML for Secure Systems Development
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
Role mining - revealing business roles for security administration using data mining technology
Proceedings of the eighth ACM symposium on Access control models and technologies
An analysis of modeling flaws in HL7 and JAHIS
Proceedings of the 2005 ACM symposium on Applied computing
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
Role engineering using graph optimisation
Proceedings of the 12th ACM symposium on Access control models and technologies
Migrating to optimal RBAC with minimal perturbation
Proceedings of the 13th ACM symposium on Access control models and technologies
Proceedings of the 13th ACM symposium on Access control models and technologies
Role engineering: From design to evolution of security schemes
Journal of Systems and Software
Requirements-based Access Control Analysis and Policy Specification (ReCAPS)
Information and Software Technology
A formal framework to elicit roles with business meaning in RBAC systems
Proceedings of the 14th ACM symposium on Access control models and technologies
Edge-RMP: Minimizing administrative assignments for role-based access control
Journal of Computer Security
ER'00 Proceedings of the 19th international conference on Conceptual modeling
An enactment-engine based on use-cases
BPM'07 Proceedings of the 5th international conference on Business process management
The role mining problem: A formal perspective
ACM Transactions on Information and System Security (TISSEC)
Proceedings of the 15th ACM symposium on Access control models and technologies
Role-based access control for a Grid system using OGSA-DAI and Shibboleth
The Journal of Supercomputing
Incorporating social-cultural contexts in role engineering: an activity theoretic approach
International Journal of Business Information Systems
Automating security configuration and administration: an access control perspective
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
Mining RBAC roles under cardinality constraint
ICISS'10 Proceedings of the 6th international conference on Information systems security
Deriving role engineering artifacts from business processes and scenario models
Proceedings of the 16th ACM symposium on Access control models and technologies
Journal of Systems and Software
Role approach in access control development with the usage control concept
CISIM'12 Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management
Hi-index | 0.00 |