Role-Based Access Control Models
Computer
Design for dynamic user-role-based security
Computers and Security
Results of the IFIP WG 11.3 Workshop on Database Security V: Status and Prospects
Towards a more complete model of role
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
On the increasing importance of constraints
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
The RSL99 language for role-based separation of duty constraints
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Supporting relationships in access control using role based access control
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Role delegation in role-based access control
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Role-based authorization constraints specification
ACM Transactions on Information and System Security (TISSEC)
A lightweight approach to specification and analysis of role-based access control extensions
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Dynamic Policy Model for Large Evolving Enterprises
EDOC '01 Proceedings of the 5th IEEE International Conference on Enterprise Distributed Object Computing
The Ponder Policy Specification Language
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
Policy management using access control spaces
ACM Transactions on Information and System Security (TISSEC)
Specification and Classification of Role-based Authorization Policies
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Verification of Access Control Coherence in Information System during Modifications
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Using uml to visualize role-based access control constraints
Proceedings of the ninth ACM symposium on Access control models and technologies
Purpose based access control of complex data for privacy protection
Proceedings of the tenth ACM symposium on Access control models and technologies
A case study of separation of duty properties in the context of the Austrian "eLaw" process.
Proceedings of the 2005 ACM symposium on Applied computing
Applying Semantic Knowledge to Real-Time Update of Access Control Policies
IEEE Transactions on Knowledge and Data Engineering
Model driven security: From UML models to access control infrastructures
ACM Transactions on Software Engineering and Methodology (TOSEM)
Systematic control and management of data integrity
Proceedings of the eleventh ACM symposium on Access control models and technologies
A lattice-based approach for updating access control policies in real-time
Information Systems
Towards realizing a formal RBAC model in real systems
Proceedings of the 12th ACM symposium on Access control models and technologies
Purpose based access control for privacy protection in relational database systems
The VLDB Journal — The International Journal on Very Large Data Bases
Role engineering: From design to evolution of security schemes
Journal of Systems and Software
Describing access control models as design patterns using roles
Proceedings of the 2006 conference on Pattern languages of programs
Deontic Logic Reasoning for Maintaining Ontology Consistency in Agent Networks
KES-AMSTA '09 Proceedings of the Third KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Authorization constraints specification of RBAC
WISA'07 Proceedings of the 8th international conference on Information security applications
Satisfiability and Resiliency in Workflow Authorization Systems
ACM Transactions on Information and System Security (TISSEC)
Conflict detection in role-based access control using multiple-attractor cellular automata
ICIC'06 Proceedings of the 2006 international conference on Intelligent Computing - Volume Part I
Cellular automata based role-delegation in RBAC
ACRI'06 Proceedings of the 7th international conference on Cellular Automata for Research and Industry
Access control using active rules
BNCOD'10 Proceedings of the 27th British national conference on Data Security and Security Data
Hi-index | 0.01 |