A user-role based data security approach
on Database Security: Status and Prospects
Object-oriented modeling and design
Object-oriented modeling and design
Role-Based Access Control Models
Computer
Argos—a configurable access control system for interoperable environments
Proceedings of the ninth annual IFIP TC11 WG11.3 working conference on Database security IX : status and prospects: status and prospects
A Logical Language for Expressing Authorizations
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Dynamic rights: safe extensible access control
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
The uses of role hierarchies in access control
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Rebuttal to the NIST RBAC model proposal
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Integrated constraints and inheritance in DTAC
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Constraint specification for object model of access control based on role
ACM SIGSOFT Software Engineering Notes
The role-based access control system of a European bank: a case study and discussion
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
A model of OASIS role-based access control and its support for active security
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
A lightweight approach to specification and analysis of role-based access control extensions
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A model for role administration using organization structure
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
An administration concept for the enterprise role-based access control model
Proceedings of the eighth ACM symposium on Access control models and technologies
Proceedings of the tenth ACM symposium on Access control models and technologies
An effective role administration model using organization structure
ACM Transactions on Information and System Security (TISSEC)
Administration in role-based access control
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Formal foundations for hybrid hierarchies in GTRBAC
ACM Transactions on Information and System Security (TISSEC)
A Critique of the ANSI Standard on Role-Based Access Control
IEEE Security and Privacy
Delegation of Control in Administrative Procedures
DEON '08 Proceedings of the 9th international conference on Deontic Logic in Computer Science
International Journal of Computer Integrated Manufacturing
Formalizing visibility characteristics in hierarchical systems
Data & Knowledge Engineering
A Formal Approach for the Evaluation of Network Security Mechanisms Based on RBAC Policies
Electronic Notes in Theoretical Computer Science (ENTCS)
A highly flexible data structure for multi-level visibility of P2P communities
ICDCN'08 Proceedings of the 9th international conference on Distributed computing and networking
Role-based modelling of interactions in database applications
CAiSE'06 Proceedings of the 18th international conference on Advanced Information Systems Engineering
A framework for modeling organization structure in role engineering
PARA'04 Proceedings of the 7th international conference on Applied Parallel Computing: state of the Art in Scientific Computing
Modeling visibility in hierarchical systems
ER'06 Proceedings of the 25th international conference on Conceptual Modeling
A security management information model derivation framework: from goals to configurations
FAST'05 Proceedings of the Third international conference on Formal Aspects in Security and Trust
Mutually exclusive permissions in RBAC
International Journal of Internet Technology and Secured Transactions
Hi-index | 0.00 |