Role-Based Access Control Models
Computer
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Rationale for the RBAC96 family of access control models
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Constraints for role-based access control
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
The role graph model and conflict of interest
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
A role-based access control model and reference implementation within a corporate intranet
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
Lattice-Based Access Control Models
Computer
Role Hierarchies and Constraints for Lattice-Based Access Controls
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Separation of Duty in Role-based Environments
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
The NIST model for role-based access control: towards a unified standard
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
An access control model for simplifying constraint expression
Proceedings of the 7th ACM conference on Computer and communications security
The role-based access control system of a European bank: a case study and discussion
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
A rule-based framework for role based delegation
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Role-based authorization constraints specification
ACM Transactions on Information and System Security (TISSEC)
Practical safety in flexible access control models
ACM Transactions on Information and System Security (TISSEC)
TRBAC: A temporal role-based access control model
ACM Transactions on Information and System Security (TISSEC)
Modeling and analyzing separation of duties in workflow environments
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
The Set and Function Approach to Modeling Authorization in Distributed Systems
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Analyzing Separation of Duties in Petri Net Workflows
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
The role control center: features and case studies
Proceedings of the eighth ACM symposium on Access control models and technologies
A flexible payment scheme and its permission-role assignment
ACSC '03 Proceedings of the 26th Australasian computer science conference - Volume 16
ADC '03 Proceedings of the 14th Australasian database conference - Volume 17
Specification and Classification of Role-based Authorization Policies
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Task-role-based access control model
Information Systems
Using uml to visualize role-based access control constraints
Proceedings of the ninth ACM symposium on Access control models and technologies
Separation of duties for access control enforcement in workflow environments
IBM Systems Journal - End-to-end security
Verifiable composition of access control and application features
Proceedings of the tenth ACM symposium on Access control models and technologies
Secure context-sensitive authorization
Pervasive and Mobile Computing
Model driven security: From UML models to access control infrastructures
ACM Transactions on Software Engineering and Methodology (TOSEM)
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Systematic control and management of data integrity
Proceedings of the eleventh ACM symposium on Access control models and technologies
Constraint generation for separation of duty
Proceedings of the eleventh ACM symposium on Access control models and technologies
Beyond separation of duty: an algebra for specifying high-level security policies
Proceedings of the 13th ACM conference on Computer and communications security
On mutually exclusive roles and separation-of-duty
ACM Transactions on Information and System Security (TISSEC)
Beyond separation of duty: An algebra for specifying high-level security policies
Journal of the ACM (JACM)
Role engineering: From design to evolution of security schemes
Journal of Systems and Software
A Model-Driven Approach for the Specification and Analysis of Access Control Policies
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
Access Control Management for SCADA Systems
IEICE - Transactions on Information and Systems
Access control for workflow environment: the RTFW model
CSCWD'06 Proceedings of the 10th international conference on Computer supported cooperative work in design III
Authorization constraints specification of RBAC
WISA'07 Proceedings of the 8th international conference on Information security applications
Combination of duty and historical constraints in role-based access control
IIT'09 Proceedings of the 6th international conference on Innovations in information technology
Satisfiability and Resiliency in Workflow Authorization Systems
ACM Transactions on Information and System Security (TISSEC)
Types for security in a mobile world
TGC'05 Proceedings of the 1st international conference on Trustworthy global computing
Access control coherence of information systems based on security constraints
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
A generic policy-conflict handling model
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
A relational database integrity framework for access control policies
Journal of Intelligent Information Systems
Performance analysis for workflow management systems under role-based authorization control
GPC'12 Proceedings of the 7th international conference on Advances in Grid and Pervasive Computing
Hi-index | 0.00 |