Security in computing
Building a secure computer system
Building a secure computer system
Role-Based Access Control Models
Computer
Modeling mandatory access control in role-based security systems
Proceedings of the ninth annual IFIP TC11 WG11.3 working conference on Database security IX : status and prospects: status and prospects
Mandatory access control and role-based access control revisited
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
RBAC emulation on trusted DG/UX
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Role Hierarchies and Constraints for Lattice-Based Access Controls
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
On permissions, inheritance and role hierarchies
Proceedings of the 10th ACM conference on Computer and communications security
Data model for a decision support in comprehensive nutrient management in the United States
Environmental Modelling & Software
An integrated model for access control and information flow requirements
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
The research for spatial role-based access control model
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV
Securing business processes using security risk-oriented patterns
Computer Standards & Interfaces
Hi-index | 0.00 |