The ARBAC97 model for role-based administration of roles: preliminary description and outline
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Decentralized user-role assignment for Web-based intranets
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
The URA97 Model for Role-Based User-Role Assignment
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
RBAC on the Web by Secure Cookies
Proceedings of the IFIP WG 11.3 Thirteenth International Conference on Database Security: Research Advances in Database and Information Systems Security
Analysis of the SSL 3.0 protocol
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Injecting RBAC to secure a Web-based workflow system
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Role-based access control on the web
ACM Transactions on Information and System Security (TISSEC)
Design and implementation of a flexible RBAC-service in an object-oriented scripting language
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Web Document Access Control Using Two-Layered Storage Structures with RBAC Server
EurAsia-ICT '02 Proceedings of the First EurAsian Conference on Information and Communication Technology
Role-based access control on the web using LDAP
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Cross-Domain Access Control via PKI
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Experiences with the enforcement of access rights extracted from ODRL-based digital contracts
Proceedings of the 3rd ACM workshop on Digital rights management
An access control framework for business processes for web services
Proceedings of the 2003 ACM workshop on XML security
A Global Ticket-Based Access Scheme for Mobile Users
Information Systems Frontiers
A composite rbac approach for large, complex organizations
Proceedings of the ninth ACM symposium on Access control models and technologies
A survey of autonomic communications
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
MobiPass: a passport for mobile business
Personal and Ubiquitous Computing
A Local Broker enabled MobiPass architecture for enhancing trusted interaction efficiency
ACSC '08 Proceedings of the thirty-first Australasian conference on Computer science - Volume 74
ASITL: adaptive secure interoperation using trust-level
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
Applying RBAC providing restricted permission inheritance to a corporate web environment
APWeb'03 Proceedings of the 5th Asia-Pacific web conference on Web technologies and applications
Access control requirements for preventing insider threats
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
An architecture for unifying web services authentication and authorization
ICSOC'05 Proceedings of the Third international conference on Service-Oriented Computing
Secure role activation and authorization in the enterprise environment
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Development of a flexible PERMIS authorisation module for shibboleth and apache server
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Interactive credential negotiation for stateful business processes
iTrust'05 Proceedings of the Third international conference on Trust Management
Hi-index | 0.00 |