Introduction to algorithms
Role-Based Access Control Models
Computer
The role graph model and conflict of interest
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
The ARBAC97 model for role-based administration of roles
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
A framework for implementing role-based access control using CORBA security service
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Object Data Management: Object-Oriented and Extended
Object Data Management: Object-Oriented and Extended
Access Rights Administration in Role-Based Security Systems
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
An access control model for simplifying constraint expression
Proceedings of the 7th ACM conference on Computer and communications security
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Managing access control complexity using metrices
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Practical safety in flexible access control models
ACM Transactions on Information and System Security (TISSEC)
TRBAC: A temporal role-based access control model
ACM Transactions on Information and System Security (TISSEC)
Secure and selective dissemination of XML documents
ACM Transactions on Information and System Security (TISSEC)
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Manageable access control for CORBA
Journal of Computer Security - Special issue on ESORICS 2000
Cooperative role-based administration
Proceedings of the eighth ACM symposium on Access control models and technologies
A methodology for managing roles in legacy systems
Proceedings of the eighth ACM symposium on Access control models and technologies
A role-based approach to access control for XML databases
Proceedings of the ninth ACM symposium on Access control models and technologies
Using uml to visualize role-based access control constraints
Proceedings of the ninth ACM symposium on Access control models and technologies
A composite rbac approach for large, complex organizations
Proceedings of the ninth ACM symposium on Access control models and technologies
Modular authorization and administration
ACM Transactions on Information and System Security (TISSEC)
Verifiable composition of access control and application features
Proceedings of the tenth ACM symposium on Access control models and technologies
Delegation in the role graph model
Proceedings of the eleventh ACM symposium on Access control models and technologies
An effective role administration model using organization structure
ACM Transactions on Information and System Security (TISSEC)
Managing RBAC states with transitive relations
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Discretionary access control with the administrative role graph model
Proceedings of the 12th ACM symposium on Access control models and technologies
A Simple Model of Negotiation for Cooperative Updates on Database Schema Components
Proceedings of the 2011 conference on Information Modelling and Knowledge Bases XXII
Specifying an access control model for ontologies for the semantic web
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Conflict of interest in the administrative role graph model
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Independent update reflections on interdependent database views
Conceptual Modelling and Its Theoretical Foundations
Nephele: Scalable Access Control for Federated File Services
Journal of Grid Computing
Hi-index | 0.00 |
The essential properties of a simple model for users, groups and group hierarchies for role-based access control, embodied in a group graph, are presented. The interaction between the group graph and the role graph model of Nyanchama and Osborn is shown. More complex models of users and their compatibility with the group graph model are discussed.