Role based access control with the security administration manager (SAM)
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
hyperDRIVE: leveraging LDAP to implement RBAC on the Web
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
A framework for implementing role-based access control using CORBA security service
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Supporting relationships in access control using role based access control
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Towards a UML based approach to role engineering
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Design and implementation of a flexible RBAC-service in an object-oriented scripting language
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Object Security Attributes: Enabling Application-Specific Access Control in Middleware
On the Move to Meaningful Internet Systems, 2002 - DOA/CoopIS/ODBASE 2002 Confederated International Conferences DOA, CoopIS and ODBASE 2002
An Approach for Modeling and Analysis of Security System Architectures
IEEE Transactions on Knowledge and Data Engineering
An architecture for supporting vicarious learning in a distributed environment
Proceedings of the 2004 ACM symposium on Applied computing
Using self-defending objects to develop security aware applications in Java™
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Role-based authorizations for workflow systems in support of task-based separation of duty
Journal of Systems and Software
An objectbase schema evolution approach to Windows NT security
WSS'00 Proceedings of the 4th conference on USENIX Windows Systems Symposium - Volume 4
Analysis of ANSI RBAC Support in COM+
Computer Standards & Interfaces
Hi-index | 0.00 |