Foundations of logic programming
Foundations of logic programming
Introduction to algorithms
Role-Based Access Control Models
Computer
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Data & Knowledge Engineering - Special jubilee issue: DKE 25
An access control model supporting periodicity constraints and temporal reasoning
ACM Transactions on Database Systems (TODS)
The role graph model and conflict of interest
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
A role-based access control model and reference implementation within a corporate intranet
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
The specification and enforcement of authorization constraints in workflow management systems
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
Flexible control of downloaded executable content
ACM Transactions on Information and System Security (TISSEC)
The RSL99 language for role-based separation of duty constraints
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Modeling users in role-based access control
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Integrated constraints and inheritance in DTAC
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
An authorization model for temporal data
Proceedings of the 7th ACM conference on Computer and communications security
Configuring role-based access control to enforce mandatory and discretionary access control policies
ACM Transactions on Information and System Security (TISSEC)
Complex Subjects, or: The Striving for Complexity is Ruling our World
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
Extending The BFA Workflow Authorization Model to Express Weighted Voting
Proceedings of the IFIP WG 11.3 Thirteenth International Conference on Database Security: Research Advances in Database and Information Systems Security
Role Hierarchies and Constraints for Lattice-Based Access Controls
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Formal Characterization of Active Databases
LID '96 Proceedings of the International Workshop on Logic in Databases
Separation of Duty in Role-based Environments
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Temporal hierarchies and inheritance semantics for GTRBAC
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A context-related authorization and access control method based on RBAC:
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Future Directions in Role-Based Access Control Models
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Dependencies and separation of duty constraints in GTRBAC
Proceedings of the eighth ACM symposium on Access control models and technologies
An approach to engineer and enforce context constraints in an RBAC environment
Proceedings of the eighth ACM symposium on Access control models and technologies
Implementing access control to people location information
Proceedings of the ninth ACM symposium on Access control models and technologies
On the role of roles: from role-based to role-sensitive access control
Proceedings of the ninth ACM symposium on Access control models and technologies
An integrated approach to engineer and enforce context constraints in RBAC environments
ACM Transactions on Information and System Security (TISSEC)
An Access Control Model for Web Services in Business Process
WI '04 Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence
SMARXO: towards secured multimedia applications by adopting RBAC, XML and object-relational database
Proceedings of the 12th annual ACM international conference on Multimedia
A Generalized Temporal Role-Based Access Control Model
IEEE Transactions on Knowledge and Data Engineering
An Authorization Model for Geospatial Data
IEEE Transactions on Dependable and Secure Computing
A Coordinated Spatio-Temporal Access Control Model for Mobile Computing in Coalition Environments
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
Supporting conditional delegation in secure workflow management systems
Proceedings of the tenth ACM symposium on Access control models and technologies
ACM Transactions on Information and System Security (TISSEC)
Timed constraint programming: a declarative approach to usage control
PPDP '05 Proceedings of the 7th ACM SIGPLAN international conference on Principles and practice of declarative programming
IEEE Transactions on Dependable and Secure Computing
PRES: a practical flexible RBAC workflow system
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
Understanding and developing role-based administrative models
Proceedings of the 12th ACM conference on Computer and communications security
Access control to people location information
ACM Transactions on Information and System Security (TISSEC)
Multimedia Tools and Applications
ACM Transactions on Information and System Security (TISSEC)
Future Generation Computer Systems
Inter-domain role mapping and least privilege
Proceedings of the 12th ACM symposium on Access control models and technologies
Towards realizing a formal RBAC model in real systems
Proceedings of the 12th ACM symposium on Access control models and technologies
Formal foundations for hybrid hierarchies in GTRBAC
ACM Transactions on Information and System Security (TISSEC)
Authentication and authorization user management within a collaborative community
ICCOMP'07 Proceedings of the 11th WSEAS International Conference on Computers
Data security in location-aware applications: an approach based on RBAC
International Journal of Information and Computer Security
On spatio-temporal constraints and inheritance in role-based access control
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Constraint based role based access control in the SECTET-framework: A model-driven approach
Journal of Computer Security - Privacy, Security and Trust (PST) Technologies: Evolution and Challenges
Enforcing security properties in task-based systems
Proceedings of the 13th ACM symposium on Access control models and technologies
An obligation model bridging access control policies and privacy policies
Proceedings of the 13th ACM symposium on Access control models and technologies
Role engineering: From design to evolution of security schemes
Journal of Systems and Software
Role management in adhoc networks
SpringSim '07 Proceedings of the 2007 spring simulaiton multiconference - Volume 1
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
DEON '08 Proceedings of the 9th international conference on Deontic Logic in Computer Science
Spatiotemporal Connectives for Security Policy in the Presence of Location Hierarchy
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Preventing conflict situations during authorization
WSEAS Transactions on Computers
Spatial Domains for the Administration of Location-based Access Control Policies
Journal of Network and Systems Management
Towards the development of privacy-aware systems
Information and Software Technology
Belnap's Logic in Sharing Protected Web Resources
KES '07 Knowledge-Based Intelligent Information and Engineering Systems and the XVII Italian Workshop on Neural Networks on Proceedings of the 11th International Conference
Supporting dynamic administration of RBAC in web-based collaborative applications during run-time
International Journal of Information and Computer Security
A Verification Framework for Temporal RBAC with Role Hierarchy (Short Paper)
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
A constraint based role based access control in the SECTET a model-driven approach
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
CRBAC: Imposing multi-grained constraints on the RBAC model in the multi-application environment
Journal of Network and Computer Applications
Security and privacy for geospatial data: concepts and research directions
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
A Flexible Access Control Model for Dynamic Workflow Using Extended WAM and RBAC
Computer Supported Cooperative Work in Design IV
Security Analysis of Role Based Access Control Models Using Colored Petri Nets and CPNtools
Transactions on Computational Science IV
Role Based Access Control with Spatiotemporal Context for Mobile Applications
Transactions on Computational Science IV
Semantic context aware security policy deployment
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Towards formal security analysis of GTRBAC using timed automata
Proceedings of the 14th ACM symposium on Access control models and technologies
Foundations for group-centric secure information sharing models
Proceedings of the 14th ACM symposium on Access control models and technologies
Description of Temporal Constraints Using Semantic Web in Role-Based Access Control
Proceedings of the 2006 conference on Knowledge-Based Software Engineering: Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering
XML-based policy specification framework for spatiotemporal access control
Proceedings of the 2nd international conference on Security of information and networks
An extended XACML model to ensure secure information access for web services
Journal of Systems and Software
Security policies for the visualization of Geo Data
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
Trade-Offs in Cryptographic Implementations of Temporal Access Control
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
An architecture approach to dynamic policy in RBAC
CSCWD'06 Proceedings of the 10th international conference on Computer supported cooperative work in design III
Review of security models applied to distributed data access
Euro-Par'06 Proceedings of the CoreGRID 2006, UNICORE Summit 2006, Petascale Computational Biology and Bioinformatics conference on Parallel processing
Towards a times-based usage control model
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Positive and negative authorizations to access protected web resources
NBiS'07 Proceedings of the 1st international conference on Network-based information systems
STARBAC: spatiotemporal role based access control
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
Architecture of context-aware workflow authorization management systems for workflow-based systems
APNOMS'09 Proceedings of the 12th Asia-Pacific network operations and management conference on Management enabling the future internet for changing business and new computing services
Architectural mismatch issues in identity management deployment
Proceedings of the Fourth European Conference on Software Architecture: Companion Volume
SaaS-model-based approach for mobile government security
International Journal of Mobile Communications
Scalable and efficient reasoning for enforcing role-based access control
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Infringo ergo sum: when will software engineering support infringements?
Proceedings of the FSE/SDP workshop on Future of software engineering research
Identity management mismatch challenges in the Danish municipality administration system
ECSA'10 Proceedings of the 4th European conference on Software architecture
SecurOntology: A semantic web access control framework
Computer Standards & Interfaces
Practical and efficient cryptographic enforcement of interval-based access control policies
ACM Transactions on Information and System Security (TISSEC)
Cryptographic enforcement of role-based access control
FAST'10 Proceedings of the 7th International conference on Formal aspects of security and trust
Access Control for Databases: Concepts and Systems
Foundations and Trends in Databases
Temporal authorizations scheme for XML document
DNCOCO'06 Proceedings of the 5th WSEAS international conference on Data networks, communications and computers
Dynamic deployment of context-aware access control policies for constrained security devices
Journal of Systems and Software
xfACL: an extensible functional language for access control
Proceedings of the 16th ACM symposium on Access control models and technologies
Modeling data flow in socio-information networks: a risk estimation approach
Proceedings of the 16th ACM symposium on Access control models and technologies
A flexible and secure access control scheme using social behavior in real world
Journal of Mobile Multimedia
A feature-based approach for modeling role-based access control systems
Journal of Systems and Software
Group-Centric Secure Information-Sharing Models for Isolated Groups
ACM Transactions on Information and System Security (TISSEC)
Access control in geographic databases
CoMoGIS'06 Proceedings of the 2006 international conference on Advances in Conceptual Modeling: theory and practice
Flexible workflow incorporated with RBAC
CSCWD'05 Proceedings of the 9th international conference on Computer Supported Cooperative Work in Design II
Analysis and run-time verification of dynamic security policies
DAMAS'05 Proceedings of the 2005 international conference on Defence Applications of Multi-Agent Systems
λ-RBAC: programming with role-based access control
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
A state-transfer-based dynamic policy approach for constraints in RBAC
WAIM'05 Proceedings of the 6th international conference on Advances in Web-Age Information Management
An approach for trusted interoperation in a multidomain environment
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
LoT-RBAC: a location and time-based RBAC model
WISE'05 Proceedings of the 6th international conference on Web Information Systems Engineering
Sharing protected web resources using distributed role-based modeling
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
A relational database integrity framework for access control policies
Journal of Intelligent Information Systems
A DRBAC model based on context for smart and secure services in intelligent ubiquitous home
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
uiH-PMAC model suitable for Ubi-Home gateway in ubiquitous intelligent environment
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
A verifiable modeling approach to configurable role-based access control
FASE'10 Proceedings of the 13th international conference on Fundamental Approaches to Software Engineering
Comparison-based encryption for fine-grained access control in clouds
Proceedings of the second ACM conference on Data and Application Security and Privacy
SecDS: a secure EPC discovery service system in EPCglobal network
Proceedings of the second ACM conference on Data and Application Security and Privacy
Specifying and reasoning about dynamic access-control policies
IJCAR'06 Proceedings of the Third international joint conference on Automated Reasoning
Conformance checking of RBAC policy and its implementation
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Safety problems in access control with temporal constraints
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
A survey of security issue in multi-agent systems
Artificial Intelligence Review
Modeling and inferring on role-based access control policies using data dependencies
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
Dynamic security rules for geo data
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Design and implementation of document access control model based on role and security policy
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Role-Based access control model for ubiquitous computing environment
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Towards a secure data stream management system
TEAA'05 Proceedings of the 31st VLDB conference on Trends in Enterprise Application Architecture
Proceedings of the 50th Annual Southeast Regional Conference
Implementation of access control model for distributed information systems using usage control
SIIS'11 Proceedings of the 2011 international conference on Security and Intelligent Information Systems
Using timed colored petri nets and CPN-tool to model and verify TRBAC security policies
VECoS'10 Proceedings of the Fourth international conference on Verification and Evaluation of Computer and Communication Systems
Analyzing temporal role based access control models
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Survey: Usage control in computer security: A survey
Computer Science Review
Decentralized governance of distributed systems via interaction control
Logic Programs, Norms and Action
On the Prevention of Fraud and Privacy Exposure in Process Information Flow
INFORMS Journal on Computing
HealthSec'12 Proceedings of the 3rd USENIX conference on Health Security and Privacy
FENCE: continuous access control enforcement in dynamic data stream environments
Proceedings of the third ACM conference on Data and application security and privacy
Proceedings of the 18th ACM symposium on Access control models and technologies
Specification and analysis of access control policies for mobile applications
Proceedings of the 18th ACM symposium on Access control models and technologies
On the Parameterized Complexity and Kernelization of the Workflow Satisfiability Problem
ACM Transactions on Information and System Security (TISSEC)
Adaptive data management for self-protecting objects in cloud computing systems
Proceedings of the 8th International Conference on Network and Service Management
Toward mining of temporal roles
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
Analysis of TRBAC with dynamic temporal role hierarchies
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
Modelling context-aware RBAC models for mobile business processes
International Journal of Wireless and Mobile Computing
The Secure Authorization Model for Healthcare Information System
Journal of Medical Systems
Annotation processes for flexible management of contextual information
Journal of Visual Languages and Computing
Future Generation Computer Systems
The RBAC model and implementation architecture in multi-domain environment
Electronic Commerce Research
Verification and enforcement of access control policies
Formal Methods in System Design
Ontology-based access control model for security policy reasoning in cloud computing
The Journal of Supercomputing
Hi-index | 0.00 |
Role-based access control (RBAC) models are receiving increasing attention as a generalized approach to access control. Roles may be available to users at certain time periods, and unavailable at others. Moreover, there can be temporal dependencies among roles. To tackle such dynamic aspects, we introduce Temporal-RBAC (TRBAC), an extension of the RBAC model. TRBAC supports periodic role enabling and disabling---possibly with individual exceptions for particular users---and temporal dependencies among such actions, expressed by means of role triggers. Role trigger actions may be either immediately executed, or deferred by an explicitly specified amount of time. Enabling and disabling actions may be given a priority, which is used to solve conflicting actions. A formal semantics for the specification language is provided, and a polynomial safeness check is introduced to reject ambiguous or inconsistent specifications. Finally, a system implementing TRBAC on top of a conventional DBMS is presented.