Role-Based Access Control Models
Computer
Lattice-Based Access Control Models
Computer
Role Hierarchies and Constraints for Lattice-Based Access Controls
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
The ARBAC97 model for role-based administration of roles: preliminary description and outline
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Decentralized user-role assignment for Web-based intranets
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
How to do discretionary access control using roles
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Proceedings of the tenth ACM Conference on Hypertext and hypermedia : returning to our diverse roots: returning to our diverse roots
The ARBAC97 model for role-based administration of roles
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
The RSL99 language for role-based separation of duty constraints
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
A rule-based framework for role based delegation
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Access control in configurable systems
Secure Internet programming
Role-based access control on the web
ACM Transactions on Information and System Security (TISSEC)
A rule-based framework for role-based delegation and revocation
ACM Transactions on Information and System Security (TISSEC)
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Role-based authorization in decentralized health care environments
Proceedings of the 2003 ACM symposium on Applied computing
End-user controlled group formation and access rights management in a shared workspace system
CSCW '04 Proceedings of the 2004 ACM conference on Computer supported cooperative work
Modality conflicts in semantics aware access control
ICWE '06 Proceedings of the 6th international conference on Web engineering
A framework for role-based group deligation in distributed environments
ACSC '06 Proceedings of the 29th Australasian Computer Science Conference - Volume 48
Design and implementation of a secure wide-area object middleware
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Critique of the ANSI Standard on Role-Based Access Control
IEEE Security and Privacy
Model-based behavioral attestation
Proceedings of the 13th ACM symposium on Access control models and technologies
A Role-Based Infrastructure for the Management of Dynamic Communities
AIMS '08 Proceedings of the 2nd international conference on Autonomous Infrastructure, Management and Security: Resilient Networks and Services
Dynamic, context-aware, least-privilege grid delegation
GRID '07 Proceedings of the 8th IEEE/ACM International Conference on Grid Computing
Access Control Management for SCADA Systems
IEICE - Transactions on Information and Systems
Business rules for semantics-aware business modelling: overview and open issues
International Journal of Web Engineering and Technology
Delegating revocations and authorizations in collaborative business environments
Information Systems Frontiers
Delegating revocations and authorizations
BPM'07 Proceedings of the 2007 international conference on Business process management
New role-based access control in ubiquitous e-business environment
Journal of Intelligent Manufacturing
Relaxed safeness in Datalog-based policies
RuleML'11 Proceedings of the 5th international conference on Rule-based modeling and computing on the semantic web
Role-Based delegation with negative authorization
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
Extending context descriptions in semantics-aware access control
ICISS'06 Proceedings of the Second international conference on Information Systems Security
New concept of authority range for flexible management of role hierarchy
WISA'05 Proceedings of the 6th international conference on Information Security Applications
On the suitability of dissemination-centric access control systems for group-centric sharing
Proceedings of the 4th ACM conference on Data and application security and privacy
Transforming high-level requirements to executable policies for Android
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication
Hi-index | 0.00 |