Role based access control with the security administration manager (SAM)
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
COM and DCOM: Microsoft's vision for distributed objects
COM and DCOM: Microsoft's vision for distributed objects
Client/server programming with Java and CORBA (2nd ed.)
Client/server programming with Java and CORBA (2nd ed.)
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Role-Based Access Control Framework for Network Enterprises
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
The RRA97 Model for Role-Based Administration of Role Hierarchies
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
Scalable access control for distributed object systems
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Mesmerize: an open framework for enterprise security management
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
Requirements for scalable access control and security management architectures
ACM Transactions on Internet Technology (TOIT)
Proceedings of the first ACM conference on Data and application security and privacy
Hi-index | 0.00 |