Role-Based Access Control Models
Computer
Future directions in role-based access control
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
A role-based access control model and reference implementation within a corporate intranet
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
Constraint specification for object model of access control based on role
ACM SIGSOFT Software Engineering Notes
Managing security policies in a distributed environment using eXtensible markup language (XML)
Proceedings of the 2001 ACM symposium on Applied computing
Panel: which access control technique will provide the greatest overall benefit
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
An argument for the role-based access control model
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
ACM SIGOPS Operating Systems Review
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
A role-based delegation framework for healthcare information systems
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Administrative scope and role hierarchy operations
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A graph-based formalism for RBAC
ACM Transactions on Information and System Security (TISSEC)
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
On the Formal Specifications of Electronic Institutions
Agent Mediated Electronic Commerce, The European AgentLink Perspective.
Administrative scope: A foundation for role-based administrative models
ACM Transactions on Information and System Security (TISSEC)
Specifying and enforcing constraints in role-based access control
Proceedings of the eighth ACM symposium on Access control models and technologies
Formal description of perfect security
ICCC '02 Proceedings of the 15th international conference on Computer communication
Task-role-based access control model
Information Systems
On permissions, inheritance and role hierarchies
Proceedings of the 10th ACM conference on Computer and communications security
Role-Based Access Controls: Status, Dissemination, and Prospects for Generic Security Mechanisms
Electronic Commerce Research
Tucupi: a flexible workflow system based on overridable constraints
Proceedings of the 2004 ACM symposium on Applied computing
Administrative scope in the graph-based framework
Proceedings of the ninth ACM symposium on Access control models and technologies
ACM Transactions on Information and System Security (TISSEC)
Secure Interoperation in a Multidomain Environment Employing RBAC Policies
IEEE Transactions on Knowledge and Data Engineering
Core role-based access control: efficient implementations by transformations
Proceedings of the 2006 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation
Key management for content access control in a hierarchy
Computer Networks: The International Journal of Computer and Telecommunications Networking
Role engineering: From design to evolution of security schemes
Journal of Systems and Software
Preventing conflict situations during authorization
WSEAS Transactions on Computers
Security Analysis of Role Based Access Control Models Using Colored Petri Nets and CPNtools
Transactions on Computational Science IV
Handling inheritance violation for secure interoperation of heterogeneous systems
International Journal of Security and Networks
New role-based access control in ubiquitous e-business environment
Journal of Intelligent Manufacturing
A relational database integrity framework for access control policies
Journal of Intelligent Information Systems
Role-based peer-to-peer model: capture global pseudonymity for privacy protection
WAIM '06 Proceedings of the 7th international conference on Advances in Web-Age Information Management
OS-DRAM: a delegation administration model in a decentralized enterprise environment
WAIM '06 Proceedings of the 7th international conference on Advances in Web-Age Information Management
Access rights – the keys to cooperative work/learning
MIS'04 Proceedings of the 2004 international conference on Metainformatics
Modeling and inferring on role-based access control policies using data dependencies
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
Integration of security policy into system modeling
B'07 Proceedings of the 7th international conference on Formal Specification and Development in B
Design and implementation of document access control model based on role and security policy
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
New concept of authority range for flexible management of role hierarchy
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Secure interoperation design in multi-domains environments based on colored Petri nets
Information Sciences: an International Journal
Hi-index | 0.00 |