ACM Transactions on Computer Systems (TOCS)
Role-Based Access Control Models
Computer
Design systolic systems: Illustrating of regular algorithms on synchronous array processors
Design systolic systems: Illustrating of regular algorithms on synchronous array processors
Constraints for role-based access control
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Towards a more complete model of role
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Role-based access control in Java
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
A Policy Based Role Object Model
EDOC '97 Proceedings of the 1st International Conference on Enterprise Distributed Object Computing
Management Policy Service for Distributed Systems
SDNE '96 Proceedings of the 3rd Workshop on Services in Distributed and Networked Environments (SDNE '96)
A Security Framework Supporting Domain Based Access Control in Distributed Systems
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
Role-based security for distributed object systems
WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
A delegation framework for federated identity management
Proceedings of the 2005 workshop on Digital identity management
Accountability in organisations
International Journal of Information and Computer Security
Commitment issues in delegation process
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
On the Security of Delegation in Access Control Systems
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Trading in risk: using markets to improve access control
Proceedings of the 2008 workshop on New security paradigms
M-M role-transfer problems and their solutions
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Instance-level access control for business-to-business electronic commerce
IBM Systems Journal
XML-Based revocation and delegation in a distributed environment
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
Delegation in role-based access control
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
A healthcare information system with augmented access controls
APWeb'12 Proceedings of the 14th Asia-Pacific international conference on Web Technologies and Applications
Model-driven adaptive delegation
Proceedings of the 12th annual international conference on Aspect-oriented software development
Hi-index | 0.00 |