A model of authorization for next-generation database systems
ACM Transactions on Database Systems (TODS)
Role-based security, object oriented databases and separation of duty
ACM SIGMOD Record
Role-Based Access Control Models
Computer
Design for dynamic user-role-based security
Computers and Security
The management of computer security profiles using a role-oriented approach
Computers and Security
Modeling mandatory access control in role-based security systems
Proceedings of the ninth annual IFIP TC11 WG11.3 working conference on Database security IX : status and prospects: status and prospects
Results of the IFIP WG 11.3 Workshop on Database Security V: Status and Prospects
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
User Group Structures in Object-Oriented Database Authorization
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
Access Rights Administration in Role-Based Security Systems
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
A keyless facility access control system with wireless enabled personal devices
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
Database Intrusion Detection Using Role Profiling with Role Hierarchy
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
A service-centric approach to a parameterized RBAC service
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Hi-index | 0.00 |