Object-oriented modeling and design
Object-oriented modeling and design
Domains: a framework for structuring management policy
Network and distributed systems management
Role-Based Access Control Models
Computer
Characteristics of role-based access control
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Design systolic systems: Illustrating of regular algorithms on synchronous array processors
Design systolic systems: Illustrating of regular algorithms on synchronous array processors
Conflict analysis for management policies
Proceedings of the fifth IFIP/IEEE international symposium on Integrated network management V : integrated management in a virtual world: integrated management in a virtual world
Towards A Role-Based Framework for DistributedSystems Management
Journal of Network and Systems Management
Management Policy Service for Distributed Systems
SDNE '96 Proceedings of the 3rd Workshop on Services in Distributed and Networked Environments (SDNE '96)
Policy Definition Language for Automated Management of Distributed Systems
SMW '96 Proceedings of the 2nd IEEE International Workshop on Systems Management (SMW'96)
Role-based security for distributed object systems
WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
Towards a more complete model of role
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Flexible control of downloaded executable content
ACM Transactions on Information and System Security (TISSEC)
On the increasing importance of constraints
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
The uses of role hierarchies in access control
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Security architecture for component-based operating systems
Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications
Flexible team-based access control using contexts
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Access control in configurable systems
Secure Internet programming
HMT: Modeling Temporal Aspects in Hypermedia Applications
WAIM '00 Proceedings of the First International Conference on Web-Age Information Management
The Work Concept RBAC Model for the Access Control of the Distributed Web Server Environment
WI '01 Proceedings of the First Asia-Pacific Conference on Web Intelligence: Research and Development
Policy-Driven Management of Agent Systems
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
A Flexible Access Control Model for Multimedia Medical Image Security
PCM '01 Proceedings of the Second IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
A Flexible Role-Based Access Control Model for Multimedia Medical Image Database Systems
ISC '01 Proceedings of the 4th International Conference on Information Security
Static verification of security requirements in role based CSCW systems
Proceedings of the eighth ACM symposium on Access control models and technologies
Sharing information on the web using bitlets
ICWE '06 Proceedings of the 6th international conference on Web engineering
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
ACM Transactions on Information and System Security (TISSEC)
Enforcing "sticky" security policies throughout a distributed application
Proceedings of the 2008 workshop on Middleware security
SecPAL: Design and semantics of a decentralized authorization language
Journal of Computer Security - Digital Identity Management (DIM 2007)
Security policies in distributed CSCW and workflow systems
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Relationship-based access control: protection model and policy language
Proceedings of the first ACM conference on Data and application security and privacy
Relationship-based access control policies and their policy languages
Proceedings of the 16th ACM symposium on Access control models and technologies
A framework for modeling organization structure in role engineering
PARA'04 Proceedings of the 7th international conference on Applied Parallel Computing: state of the Art in Scientific Computing
Datalog for security, privacy and trust
Datalog'10 Proceedings of the First international conference on Datalog Reloaded
Automated and efficient analysis of role-based access control with attributes
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Mining parameterized role-based policies
Proceedings of the third ACM conference on Data and application security and privacy
Hi-index | 0.00 |