Role-Based Access Control Models
Computer
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Role based access control on MLS systems without kernel changes
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Control principles and role hierarchies
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Formal specification for role based access control user/role and role/role relationship management
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
The role graph model and conflict of interest
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
A role-based access control model and reference implementation within a corporate intranet
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
The ARBAC97 model for role-based administration of roles
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
On the increasing importance of constraints
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
SecureFlow: a secure Web-enabled workflow management system
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
TRBAC: a temporal role-based access control model
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
The NIST model for role-based access control: towards a unified standard
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Rebuttal to the NIST RBAC model proposal
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Configuring role-based access control to enforce mandatory and discretionary access control policies
ACM Transactions on Information and System Security (TISSEC)
Security models for web-based applications
Communications of the ACM
Role-based authorization constraints specification
ACM Transactions on Information and System Security (TISSEC)
Results of the IFIP WG 11.3 Workshop on Database Security V: Status and Prospects
Access Rights Administration in Role-Based Security Systems
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
ACM SIGOPS Operating Systems Review
A Formal Model for Role-Based Access Control with Constraints
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Role-based administration of user-role assignment: The URA97 model and its Oracle implementation
Journal of Computer Security
An authorization model for a public key management service
ACM Transactions on Information and System Security (TISSEC)
A scenario-driven role engineering process for functional RBAC roles
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Observations on the role life-cycle in the context of enterprise security management
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A context-related authorization and access control method based on RBAC:
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A graph-based formalism for RBAC
ACM Transactions on Information and System Security (TISSEC)
Managing Access in Extended Enterprise Networks
IEEE Internet Computing
Future Directions in Role-Based Access Control Models
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
SecureUML: A UML-Based Modeling Language for Model-Driven Security
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
Trust-Based Security Model and Enforcement Mechanism for Web Service Technology
TES '02 Proceedings of the Third International Workshop on Technologies for E-Services
Role-Based Access Control for E-commerce Sea-of-Data Applications
ISC '02 Proceedings of the 5th International Conference on Information Security
An administration concept for the enterprise role-based access control model
Proceedings of the eighth ACM symposium on Access control models and technologies
The role control center: features and case studies
Proceedings of the eighth ACM symposium on Access control models and technologies
Cooperative role-based administration
Proceedings of the eighth ACM symposium on Access control models and technologies
Specifying and enforcing constraints in role-based access control
Proceedings of the eighth ACM symposium on Access control models and technologies
Dependencies and separation of duty constraints in GTRBAC
Proceedings of the eighth ACM symposium on Access control models and technologies
An approach to engineer and enforce context constraints in an RBAC environment
Proceedings of the eighth ACM symposium on Access control models and technologies
Model driven security for process-oriented systems
Proceedings of the eighth ACM symposium on Access control models and technologies
The tees confidentiality model: an authorisation model for identities and roles
Proceedings of the eighth ACM symposium on Access control models and technologies
Implementing role based access control for federated information systems on the web
ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21
Relationship Management: Secure Collaboration in a Ubiquitous Environment
IEEE Pervasive Computing
Recent advances in access control models
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Policy management using access control spaces
ACM Transactions on Information and System Security (TISSEC)
Experiences with the enforcement of access rights extracted from ODRL-based digital contracts
Proceedings of the 3rd ACM workshop on Digital rights management
On permissions, inheritance and role hierarchies
Proceedings of the 10th ACM conference on Computer and communications security
Dynamic Context-aware Access Control for Grid Applications
GRID '03 Proceedings of the 4th International Workshop on Grid Computing
A study of the method of providing secure network channel among secure OSs
ISICT '03 Proceedings of the 1st international symposium on Information and communication technologies
Embedding role-based access control model in object-oriented systems to protect privacy
Journal of Systems and Software
Trust-serv: model-driven lifecycle management of trust negotiation policies for web services
Proceedings of the 13th international conference on World Wide Web
Role-based access control in ambient and remote space
Proceedings of the ninth ACM symposium on Access control models and technologies
A role-based approach to access control for XML databases
Proceedings of the ninth ACM symposium on Access control models and technologies
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Proceedings of the ninth ACM symposium on Access control models and technologies
Proceedings of the ninth ACM symposium on Access control models and technologies
Using uml to visualize role-based access control constraints
Proceedings of the ninth ACM symposium on Access control models and technologies
Security analysis in role-based access control
Proceedings of the ninth ACM symposium on Access control models and technologies
Workflow View Driven Cross-Organizational Interoperability in a Web Service Environment
Information Technology and Management
Decentralized Authentication Mechanisms for Object-based Storage Devices
SISW '03 Proceedings of the Second IEEE International Security in Storage Workshop
Modular authorization and administration
ACM Transactions on Information and System Security (TISSEC)
An integrated approach to engineer and enforce context constraints in RBAC environments
ACM Transactions on Information and System Security (TISSEC)
A First Step Towards Formal Verification of Security Policy Properties for RBAC
QSIC '04 Proceedings of the Quality Software, Fourth International Conference
An Access Control Model for Web Services in Business Process
WI '04 Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence
MAC and UML for secure software design
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
On mutually-exclusive roles and separation of duty
Proceedings of the 11th ACM conference on Computer and communications security
Access-Control Language for Multidomain Environments
IEEE Internet Computing
Data protection and data sharing in telematics
Mobile Networks and Applications
A Generalized Temporal Role-Based Access Control Model
IEEE Transactions on Knowledge and Data Engineering
Providing flexible access control to an information flow control model
Journal of Systems and Software
A Flexible Payment Scheme and Its Role-Based Access Control
IEEE Transactions on Knowledge and Data Engineering
A Network Access Control Approach Based on the AAA Architecture and Authorization Attributes
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
A Management Perspective on Risk of Security Threats to Information Systems
Information Technology and Management
GEO-RBAC: a spatially aware RBAC
Proceedings of the tenth ACM symposium on Access control models and technologies
Verifiable composition of access control and application features
Proceedings of the tenth ACM symposium on Access control models and technologies
Rule support for role-based access control
Proceedings of the tenth ACM symposium on Access control models and technologies
SERAT: SEcure role mApping technique for decentralized secure interoperability
Proceedings of the tenth ACM symposium on Access control models and technologies
ACM Transactions on Information and System Security (TISSEC)
Formal specification of role-based security policies for clinical information systems
Proceedings of the 2005 ACM symposium on Applied computing
Mediation security specification and enforcement for heterogeneous databases
Proceedings of the 2005 ACM symposium on Applied computing
Timed constraint programming: a declarative approach to usage control
PPDP '05 Proceedings of the 7th ACM SIGPLAN international conference on Principles and practice of declarative programming
A Trust-Based Context-Aware Access Control Model for Web-Services
Distributed and Parallel Databases
An organisation infrastructure for Multi-Agent Systems based on Agent Coordination Contexts
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
Access control with safe role assignment for mobile agents
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
The C-Cube framework: developing autonomic applications through web services
DEAS '05 Proceedings of the 2005 workshop on Design and evolution of autonomic application software
Requirements traceability to support evolution of access control
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
An information flow control model for C applications based on access control lists
Journal of Systems and Software
Secure collaboration in mediator-free environments
Proceedings of the 12th ACM conference on Computer and communications security
Understanding and developing role-based administrative models
Proceedings of the 12th ACM conference on Computer and communications security
X-gtrbac admin: A decentralized administration model for enterprise-wide access control
ACM Transactions on Information and System Security (TISSEC)
SESAME: Scalable, Environment Sensitive Access Management Engine
Cluster Computing
Core role-based access control: efficient implementations by transformations
Proceedings of the 2006 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation
Towards a dynamic multi-policy dissemination control model: (DMDCON)
ACM SIGMOD Record
Model driven security: From UML models to access control infrastructures
ACM Transactions on Software Engineering and Methodology (TOSEM)
Secure information sharing enabled by Trusted Computing and PEI models
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Safety analysis of usage control authorization models
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
TrustBAC: integrating trust relationships into the RBAC model for access control in open systems
Proceedings of the eleventh ACM symposium on Access control models and technologies
Fine-grained role-based delegation in presence of the hybrid role hierarchy
Proceedings of the eleventh ACM symposium on Access control models and technologies
Constraint generation for separation of duty
Proceedings of the eleventh ACM symposium on Access control models and technologies
Data-centric security: role analysis and role typestates
Proceedings of the eleventh ACM symposium on Access control models and technologies
Role-based access management for ad-hoc collaborative sharing
Proceedings of the eleventh ACM symposium on Access control models and technologies
Presto Authorization: A Bitmap Indexing Scheme for High-Speed Access Control to XML Documents
IEEE Transactions on Knowledge and Data Engineering
PKI-based secure mobile access to electronic health services and data
Technology and Health Care
Inferring dynamic credentials for rôle-based trust management
Proceedings of the 8th ACM SIGPLAN international conference on Principles and practice of declarative programming
Architectural issues for a location-aware role-based access control system
Proceedings of the 2006 ACM symposium on Applied computing
Managing role relationships in an information flow control model
Journal of Systems and Software
Role-based access control for a distributed calculus
Journal of Computer Security - Special issue on CSFW17
Token-based dynamic trust establishment for web services
Proceedings of the 43rd annual Southeast regional conference - Volume 2
The management of users, roles, and permissions in JDOSecure
PPPJ '06 Proceedings of the 4th international symposium on Principles and practice of programming in Java
Inverting sensor networks and actuating the environment for spatio-temporal access control
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
An extended RBAC profile of XACML
Proceedings of the 3rd ACM workshop on Secure web services
Secure attribute-based systems
Proceedings of the 13th ACM conference on Computer and communications security
RoleMiner: mining roles using subset enumeration
Proceedings of the 13th ACM conference on Computer and communications security
Security analysis in role-based access control
ACM Transactions on Information and System Security (TISSEC)
Secure Integration of Distributed Medical Data Using Mobile Agents
IEEE Intelligent Systems
Efficient Access Control in Wireless Network
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
GEO-RBAC: A spatially aware RBAC
ACM Transactions on Information and System Security (TISSEC)
Administration in role-based access control
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Managing RBAC states with transitive relations
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Addressing interoperability issues in access control models
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Distributed multimedia information systems: an end-to-end perspective
Multimedia Tools and Applications
Key management for role hierarchy in distributed systems
Journal of Network and Computer Applications
A network access control approach based on the AAA architecture and authorization attributes
Journal of Network and Computer Applications
Security risk mitigation for information systems
BT Technology Journal
On mutually exclusive roles and separation-of-duty
ACM Transactions on Information and System Security (TISSEC)
Visual modeling and formal specification of constraints of RBAC using semantic web technology
Knowledge-Based Systems
Requirements for scalable access control and security management architectures
ACM Transactions on Internet Technology (TOIT)
A machine learning approach to semi-automating workflow staff assignment
Proceedings of the 2007 ACM symposium on Applied computing
Efficient implementation of tuple pattern based retrieval
Proceedings of the 2007 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation
Privacy-aware role based access control
Proceedings of the 12th ACM symposium on Access control models and technologies
Role engineering using graph optimisation
Proceedings of the 12th ACM symposium on Access control models and technologies
The role mining problem: finding a minimal descriptive set of roles
Proceedings of the 12th ACM symposium on Access control models and technologies
Towards realizing a formal RBAC model in real systems
Proceedings of the 12th ACM symposium on Access control models and technologies
Using semantics for automatic enforcement of access control policies among dynamic coalitions
Proceedings of the 12th ACM symposium on Access control models and technologies
Secure Information Sharing in a Virtual Multi-Agency Team Environment
Electronic Notes in Theoretical Computer Science (ENTCS)
A middleware architecture for privacy protection
Computer Networks: The International Journal of Computer and Telecommunications Networking
Web services discovery in secure collaboration environments
ACM Transactions on Internet Technology (TOIT)
Feasibility and benefits of migrating towards JEE: a real life case
Proceedings of the 5th international symposium on Principles and practice of programming in Java
A multimedia access control language for virtual and ambient intelligence environments
Proceedings of the 2007 ACM workshop on Secure web services
Trust-Serv: a lightweight trust negotiation service
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
A Critique of the ANSI Standard on Role-Based Access Control
IEEE Security and Privacy
Information and Software Technology
Enabling declarative security through the use of Java Data Objects
Science of Computer Programming
Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies
Electronic Notes in Theoretical Computer Science (ENTCS)
Anonymity analysis in credentials-based systems: A formal framework
Computer Standards & Interfaces
SEED: A Suite of Instructional Laboratories for Computer Security Education
Journal on Educational Resources in Computing (JERIC)
MCSE: a multimedia context-based security engine
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Authentication and authorization user management within a collaborative community
ICCOMP'07 Proceedings of the 11th WSEAS International Conference on Computers
Workflow authorisation in mediator-free environments
International Journal of Security and Networks
RB-GACA: an RBAC based grid access control architecture
International Journal of Grid and Utility Computing
Data security in location-aware applications: an approach based on RBAC
International Journal of Information and Computer Security
A semi-automatic approach for workflow staff assignment
Computers in Industry
Knowledge sharing in virtual enterprises via an ontology-based access control approach
Computers in Industry
Role-based access control for boxed ambients
Theoretical Computer Science
Migrating to optimal RBAC with minimal perturbation
Proceedings of the 13th ACM symposium on Access control models and technologies
ROWLBAC: representing role based access control in OWL
Proceedings of the 13th ACM symposium on Access control models and technologies
Proceedings of the 13th ACM symposium on Access control models and technologies
Context-aware role-based access control in pervasive computing systems
Proceedings of the 13th ACM symposium on Access control models and technologies
An obligation model bridging access control policies and privacy policies
Proceedings of the 13th ACM symposium on Access control models and technologies
Interactive access control for autonomic systems: From theory to implementation
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Purpose based access control for privacy protection in relational database systems
The VLDB Journal — The International Journal on Very Large Data Bases
The Journal of Supercomputing
Role engineering: From design to evolution of security schemes
Journal of Systems and Software
INFRASTRUCTURE FOR RBAC-MAS: AN APPROACH BASED ON AGENT COORDINATION CONTEXTS
Applied Artificial Intelligence
Role management in adhoc networks
SpringSim '07 Proceedings of the 2007 spring simulaiton multiconference - Volume 1
ACM Transactions on Information and System Security (TISSEC)
Patterns for session-based access control
Proceedings of the 2006 conference on Pattern languages of programs
Describing access control models as design patterns using roles
Proceedings of the 2006 conference on Pattern languages of programs
Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature
Computational Intelligence and Security
Pattern-Based Transformation Rules for Developing Interaction Models of Access Control Systems
ICSR '08 Proceedings of the 10th international conference on Software Reuse: High Confidence Software Reuse in Large Systems
High-Assurance Integrity Techniques for Databases
BNCOD '08 Proceedings of the 25th British national conference on Databases: Sharing Data, Information and Knowledge
Work Distribution and Resource Management in BPEL4People: Capabilities and Opportunities
CAiSE '08 Proceedings of the 20th international conference on Advanced Information Systems Engineering
Dynamic Meta-level Access Control in SQL
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Model-Driven Security in Practice: An Industrial Experience
ECMDA-FA '08 Proceedings of the 4th European conference on Model Driven Architecture: Foundations and Applications
The CRUTIAL Architecture for Critical Information Infrastructures
Architecting Dependable Systems V
Scenario-Based Static Analysis of UML Class Models
MoDELS '08 Proceedings of the 11th international conference on Model Driven Engineering Languages and Systems
A Model-Based Framework for Security Policy Specification, Deployment and Testing
MoDELS '08 Proceedings of the 11th international conference on Model Driven Engineering Languages and Systems
Secure mobile agent environments: modelling role assignments
International Journal of Electronic Security and Digital Forensics
A class of probabilistic models for role engineering
Proceedings of the 15th ACM conference on Computer and communications security
Enforcing a security pattern in stakeholder goal models
Proceedings of the 4th ACM workshop on Quality of protection
Preventing conflict situations during authorization
WSEAS Transactions on Computers
Decentralized Access Control Management for Network Configuration
Journal of Network and Systems Management
Reusability of Functionality-Based Application Confinement Policy Abstractions
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Supporting dynamic administration of RBAC in web-based collaborative applications during run-time
International Journal of Information and Computer Security
Specification of SA-RBAC Policy Based on Colored Petri Net
WI-IAT '08 Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
Requirements of federated trust management for service-oriented architectures
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
A new architecture for performance-based policy management in heterogeneous wireless networks
Mobility '08 Proceedings of the International Conference on Mobile Technology, Applications, and Systems
Automated analysis of security-design models
Information and Software Technology
Action Control by Term Rewriting
Electronic Notes in Theoretical Computer Science (ENTCS)
Event-oriented Web-based E-trading
Electronic Notes in Theoretical Computer Science (ENTCS)
A secure collaborative web-based environment for virtual organisations
International Journal of Web Based Communities
Security Violation Detection for RBAC Based Interoperation in Distributed Environment
IEICE - Transactions on Information and Systems
Enforcing role based access control model with multimedia signatures
Journal of Systems Architecture: the EUROMICRO Journal
The Challenge of Assuring Data Trustworthiness
DASFAA '09 Proceedings of the 14th International Conference on Database Systems for Advanced Applications
Security Analysis of Role Based Access Control Models Using Colored Petri Nets and CPNtools
Transactions on Computational Science IV
Role Based Access Control with Spatiotemporal Context for Mobile Applications
Transactions on Computational Science IV
A Hardware Architecture for Integrated-Security Services
Transactions on Computational Science IV
Separation of Duty in Trust-Based Collaboration
Information Security and Cryptology
Ensuring spatio-temporal access control for real-world applications
Proceedings of the 14th ACM symposium on Access control models and technologies
Efficient access enforcement in distributed role-based access control (RBAC) deployments
Proceedings of the 14th ACM symposium on Access control models and technologies
The next 700 access control models or a unifying meta-model?
Proceedings of the 14th ACM symposium on Access control models and technologies
Extending access control models with break-glass
Proceedings of the 14th ACM symposium on Access control models and technologies
Working set-based access control for network file systems
Proceedings of the 14th ACM symposium on Access control models and technologies
Edge-RMP: Minimizing administrative assignments for role-based access control
Journal of Computer Security
Multi-assignment clustering for Boolean data
ICML '09 Proceedings of the 26th Annual International Conference on Machine Learning
A specification language for information security policies
CIS'09 Proceedings of the international conference on Computational and information science 2009
Selective Regression Test for Access Control System Employing RBAC
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Security automation considered harmful?
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Reaction Policy Model Based on Dynamic Organizations and Threat Context
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
A Semantic-Aware Attribute-Based Access Control Model for Web Services
ICA3PP '09 Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing
The OPL Access Control Policy Language
TrustBus '09 Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business
Query Processing Techniques for Compliance with Data Confidence Policies
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
XML-based policy specification framework for spatiotemporal access control
Proceedings of the 2nd international conference on Security of information and networks
Area-Based Collaborative Ubiquitous Work within Organizational Environments
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 01
Role based access control for a medical database
SEA '07 Proceedings of the 11th IASTED International Conference on Software Engineering and Applications
A probabilistic approach to hybrid role mining
Proceedings of the 16th ACM conference on Computer and communications security
An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation
Proceedings of the 2009 conference on New Trends in Software Methodologies, Tools and Techniques: Proceedings of the Eighth SoMeT_09
A rule-based CBR approach for expert finding and problem diagnosis
Expert Systems with Applications: An International Journal
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Applying quorum role in network management
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Activity-oriented access control for ubiquitous environments
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
RBAC for Organisation and Security in an Agent Coordination Infrastructure
Electronic Notes in Theoretical Computer Science (ENTCS)
Paralocks: role-based information flow control and beyond
Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
An ontology-based approach to react to network attacks
International Journal of Information and Computer Security
Access control for XML documents and data
Information Security Tech. Report
AsiaCSN '07 Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks
A system for visual role-based policy modelling
Journal of Visual Languages and Computing
A novel approach to role-based access control
ICCS'03 Proceedings of the 2003 international conference on Computational science
Formalization of RBAC policy with object class hierarchy
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
A novel use of RBAC to protect privacy in distributed health care information systems
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
A smart card based distributed identity management infrastructure for mobile ad hoc networks
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
Review of security models applied to distributed data access
Euro-Par'06 Proceedings of the CoreGRID 2006, UNICORE Summit 2006, Petascale Computational Biology and Bioinformatics conference on Parallel processing
Analysis of ANSI RBAC Support in COM+
Computer Standards & Interfaces
A spatio-temporal role-based access control model
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
XACML policies for exclusive resource usage
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Context-aware security management system for pervasive computing environment
CONTEXT'07 Proceedings of the 6th international and interdisciplinary conference on Modeling and using context
A simple role mining algorithm
Proceedings of the 2010 ACM Symposium on Applied Computing
Establishing RBAC-based secure interoperability in decentralized multi-domain environments
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
Positive and negative authorizations to access protected web resources
NBiS'07 Proceedings of the 1st international conference on Network-based information systems
Identity as a service-towards a service-oriented identity management architecture
EUNICE'07 Proceedings of the 13th open European summer school and IFIP TC6.6 conference on Dependable and adaptable networks and services
Declarative process modeling with business vocabulary and business rules
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems - Volume Part I
Management advantages of object classification in role-based access control (RBAC)
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Specifying access control policies on data streams
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
STARBAC: spatiotemporal role based access control
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Specifying process-aware access control rules in SBVR
RuleML'07 Proceedings of the 2007 international conference on Advances in rule interchange and applications
The separation of duty with privilege calculus
RSKT'08 Proceedings of the 3rd international conference on Rough sets and knowledge technology
A formal framework for adaptive access control models
Journal on data semantics IX
Combination of duty and historical constraints in role-based access control
IIT'09 Proceedings of the 6th international conference on Innovations in information technology
Anonymous context based role activation mechanism
Proceedings of the 13th international conference on Security protocols
Modeling of the role-based access control policy with constraints using description logic
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Privacy-aware role-based access control
ACM Transactions on Information and System Security (TISSEC)
The role mining problem: A formal perspective
ACM Transactions on Information and System Security (TISSEC)
An effective access control approach to support web service security
Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services
Monitoring security policies with metric first-order temporal logic
Proceedings of the 15th ACM symposium on Access control models and technologies
On the definition of role mining
Proceedings of the 15th ACM symposium on Access control models and technologies
Proceedings of the 15th ACM symposium on Access control models and technologies
Proceedings of the 15th ACM symposium on Access control models and technologies
Towards session-aware RBAC administration and enforcement with XACML
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
Apply measurable risk to strengthen security of a role-based delegation supporting workflow system
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
Formalization and management of group obligations
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
Dynamic enforcement of abstract separation of duty constraints
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
A privacy preservation model for facebook-style social network systems
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Architecture of context-aware workflow authorization management systems for workflow-based systems
APNOMS'09 Proceedings of the 12th Asia-Pacific network operations and management conference on Management enabling the future internet for changing business and new computing services
Activity-oriented access control to ubiquitous hospital information and services
Information Sciences: an International Journal
A universal access control method based on host identifiers for Future Internet
Computers & Mathematics with Applications
A purpose-based privacy-aware system using privacy data graph
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
Design of RBAC-based secure KAgent framework for home network applications
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
Integrating GSTRBAC spatial constraints in X-GTRBAC
Proceedings of the 7th International Conference on Frontiers of Information Technology
Constructing authorization systems using assurance management framework
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Secure attribute-based systems
Journal of Computer Security
An adaptive work distribution mechanism based on reinforcement learning
Expert Systems with Applications: An International Journal
Architectural mismatch issues in identity management deployment
Proceedings of the Fourth European Conference on Software Architecture: Companion Volume
Policy framework for security and privacy management
IBM Journal of Research and Development
IBM Journal of Research and Development
Graph based strategies to role engineering
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Towards trustworthy shared networked sensor-actuator systems
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
A mobile IP based WLAN security management framework with reconfigurable hardware acceleration
Proceedings of the 3rd international conference on Security of information and networks
Security-driven model-based dynamic adaptation
Proceedings of the IEEE/ACM international conference on Automated software engineering
Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment
Wireless Personal Communications: An International Journal
Privacy-aware access control with generalization boundaries
ACSC '09 Proceedings of the Thirty-Second Australasian Conference on Computer Science - Volume 91
SaaS-model-based approach for mobile government security
International Journal of Mobile Communications
Role mining in the presence of noise
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
fQuery: SPARQL query rewriting to enforce data confidentiality
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Mining likely properties of access control policies via association rule mining
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Scalable and efficient reasoning for enforcing role-based access control
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Fault coverage of Constrained Random Test Selection for access control: A formal analysis
Journal of Systems and Software
Group-centric models for secure and agile information sharing
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Model checking of location and mobility related security policy specifications in ambient calculus
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Credential chain discovery in RTTtrust management language
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Identity management mismatch challenges in the Danish municipality administration system
ECSA'10 Proceedings of the 4th European conference on Software architecture
Configurable multi-perspective business process models
Information Systems
Incorporating social-cultural contexts in role engineering: an activity theoretic approach
International Journal of Business Information Systems
Reinforcement learning based resource allocation in business process management
Data & Knowledge Engineering
Independently verifiable decentralized role-based delegation
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Analysis of the minimal privacy disclosure for web services collaborations with role mechanisms
Expert Systems with Applications: An International Journal
Towards automatic update of access control policy
LISA'10 Proceedings of the 24th international conference on Large installation system administration
Automating security configuration and administration: an access control perspective
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
Resource management with X.509 inter-domain authorization certificates (InterAC)
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
Mining RBAC roles under cardinality constraint
ICISS'10 Proceedings of the 6th international conference on Information systems security
Relationship-based access control: protection model and policy language
Proceedings of the first ACM conference on Data and application security and privacy
RAR: A role-and-risk based flexible framework for secure collaboration
Future Generation Computer Systems
Automatic conformance checking of role-based access control policies via alloy
ESSoS'11 Proceedings of the Third international conference on Engineering secure software and systems
Managing conflict of interest in service composition
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems - Volume Part I
Supporting role based provisioning with rules using OWL and F-logic
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems - Volume Part I
Rewriting of SPARQL/update queries for securing data access
ICICS'10 Proceedings of the 12th international conference on Information and communications security
BABAC: An Access Control Framework for Network Virtualization Using User Behaviors and Attributes
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Towards accuracy of role-based access control configurations in component-based systems
Journal of Systems Architecture: the EUROMICRO Journal
Fuzzy Role-Based Access Control
Information Processing Letters
Protecting critical infrastructures while preserving each organization's autonomy
ICDCIT'11 Proceedings of the 7th international conference on Distributed computing and internet technology
Separation of duties as a service
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Remote Patient Monitoring Within a Future 5G Infrastructure
Wireless Personal Communications: An International Journal
Study on role-based access control model for web services and its application
TELE-INFO'06 Proceedings of the 5th WSEAS international conference on Telecommunications and informatics
Dynamic access control administration for collaborative applications
ICCOMP'06 Proceedings of the 10th WSEAS international conference on Computers
The design of secure node system based on integrated security engine (SNSISE)
CIMMACS'05 Proceedings of the 4th WSEAS international conference on Computational intelligence, man-machine systems and cybernetics
Modeling and negotiating service quality
Service research challenges and solutions for the future internet
Types for security in a mobile world
TGC'05 Proceedings of the 1st international conference on Trustworthy global computing
Evaluating access control of open source electronic health record systems
Proceedings of the 3rd Workshop on Software Engineering in Health Care
Flexible secure inter-domain interoperability through attribute conversion
Information Sciences: an International Journal
Mixing privacy with role-based access control
Proceedings of The Fourth International C* Conference on Computer Science and Software Engineering
Process compliance analysis based on behavioural profiles
Information Systems
Relationship-based access control policies and their policy languages
Proceedings of the 16th ACM symposium on Access control models and technologies
xfACL: an extensible functional language for access control
Proceedings of the 16th ACM symposium on Access control models and technologies
Validation of security policies by the animation of Z specifications
Proceedings of the 16th ACM symposium on Access control models and technologies
GIS analysis of U.S. patent data: examining local innovation patterns
Proceedings of the 2nd International Conference on Computing for Geospatial Research & Applications
Query rewriting in spatial database for access control
Proceedings of the 2nd International Conference on Computing for Geospatial Research & Applications
Types for role-based access control of dynamic web data
WFLP'10 Proceedings of the 19th international conference on Functional and constraint logic programming
Model-driven development of security-aware GUIs for data-centric applications
Foundations of security analysis and design VI
Greedy algorithm for least privilege in RBAC model
COCOA'11 Proceedings of the 5th international conference on Combinatorial optimization and applications
A feature-based approach for modeling role-based access control systems
Journal of Systems and Software
Information systems resources and information security
Information Systems Frontiers
Proceedings of the 2011 workshop on New security paradigms workshop
Conformance checking of dynamic access control policies
ICFEM'11 Proceedings of the 13th international conference on Formal methods and software engineering
Validation of security-design models using Z
ICFEM'11 Proceedings of the 13th international conference on Formal methods and software engineering
A WSDM-based architecture for global usage characterization of grid computing infrastructures
DSOM'06 Proceedings of the 17th IFIP/IEEE international conference on Distributed Systems: operations and management
Design and implementation of fast access control that supports the separation of duty
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
An organisation infrastructure for multi-agent systems based on agent coordination contexts
AI*IA'05 Proceedings of the 9th conference on Advances in Artificial Intelligence
A model transformation semantics and analysis methodology for SecureUML
MoDELS'06 Proceedings of the 9th international conference on Model Driven Engineering Languages and Systems
Resolving information flow conflicts in RBAC systems
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Discretionary and mandatory controls for role-based administration
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Authrule: a generic rule-based authorization module
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Access control coherence of information systems based on security constraints
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
Context-Role based access control for context-aware application
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
Poster: trans-organizational role-based access control
Proceedings of the 18th ACM conference on Computer and communications security
Field access analysis for enforcing access control policies
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
λ-RBAC: programming with role-based access control
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Using description logic to determine seniority among RB-RBAC authorization rules
RSKT'06 Proceedings of the First international conference on Rough Sets and Knowledge Technology
An efficient access control model for highly distributed computing environment
IWDC'05 Proceedings of the 7th international conference on Distributed Computing
Integrative security management for web-based enterprise applications
WAIM'05 Proceedings of the 6th international conference on Advances in Web-Age Information Management
An authorization framework for sharing data in web service federations
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Key management for role hierarchy in distributed systems
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Access control requirements for preventing insider threats
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
An access control system for multimedia content distribution
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
LoT-RBAC: a location and time-based RBAC model
WISE'05 Proceedings of the 6th international conference on Web Information Systems Engineering
Sharing protected web resources using distributed role-based modeling
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
SP'04 Proceedings of the 12th international conference on Security Protocols
A dynamic access control model
Applied Intelligence
A verifiable modeling approach to configurable role-based access control
FASE'10 Proceedings of the 13th international conference on Fundamental Approaches to Software Engineering
The research for spatial role-based access control model
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV
Using π-calculus to formalize domain administration of RBAC
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
A security architecture for adapting multiple access control models to operating systems
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
Workflow resource patterns: identification, representation and tool support
CAiSE'05 Proceedings of the 17th international conference on Advanced Information Systems Engineering
A security model for home networks with authority delegation
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Representation of extended RBAC model using UML language
SOFSEM'05 Proceedings of the 31st international conference on Theory and Practice of Computer Science
Role-based modelling of interactions in database applications
CAiSE'06 Proceedings of the 18th international conference on Advanced Information Systems Engineering
Role-based peer-to-peer model: capture global pseudonymity for privacy protection
WAIM '06 Proceedings of the 7th international conference on Advances in Web-Age Information Management
Security and trust requirements engineering
Foundations of Security Analysis and Design III
Role slices: a notation for RBAC permission assignment and enforcement
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Access controls for privacy protection in pervasive environments
Proceedings of the 4th International Conference on PErvasive Technologies Related to Assistive Environments
Inconsistency detection of authorization policies in distributed component environment
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Web data protection: principles and research issues
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
Automatic enforcement of access control policies among dynamic coalitions
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
Ontology-Based RBAC specification for interoperation in distributed environment
ASWC'06 Proceedings of the First Asian conference on The Semantic Web
A task-oriented access control model for WfMS
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Interactive credential negotiation for stateful business processes
iTrust'05 Proceedings of the Third international conference on Trust Management
A formal enforcement framework for role-based access control using aspect-oriented programming
MoDELS'05 Proceedings of the 8th international conference on Model Driven Engineering Languages and Systems
Long-term temporal data representation of personal health data
ADBIS'05 Proceedings of the 9th East European conference on Advances in Databases and Information Systems
Safety problems in access control with temporal constraints
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
A modal logic for role-based access control
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
An efficient access control model utilized the attribute certificate structuring
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
A cryptographic solution for general access control
ISC'05 Proceedings of the 8th international conference on Information Security
A location-aware secure interworking architecture between 3GPP and WLAN systems
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Representation and reasoning on RBAC: a description logic approach
ICTAC'05 Proceedings of the Second international conference on Theoretical Aspects of Computing
Distributed authorization framework for mobile agents
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
Discretionary capability confinement
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
An XML standards based authorization framework for mobile agents
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
ShareEnabler: policy-driven access management for ad-hoc collaborative sharing
EDBT'06 Proceedings of the 2006 international conference on Current Trends in Database Technology
FORBAC: a flexible organisation and role-based access control model for secure information systems
ADVIS'06 Proceedings of the 4th international conference on Advances in Information Systems
Web application security gateway with java non-blocking IO
NGITS'06 Proceedings of the 6th international conference on Next Generation Information Technologies and Systems
Adding support to XACML for dynamic delegation of authority in multiple domains
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Spatial context in role-based access control
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Integration of security policy into system modeling
B'07 Proceedings of the 7th international conference on Formal Specification and Development in B
Category-Based authorisation models: operational semantics and expressive power
ESSoS'10 Proceedings of the Second international conference on Engineering Secure Software and Systems
Automatic generation of smart, security-aware GUI models
ESSoS'10 Proceedings of the Second international conference on Engineering Secure Software and Systems
Role-Based access control model for ubiquitous computing environment
WISA'05 Proceedings of the 6th international conference on Information Security Applications
ICISS'05 Proceedings of the First international conference on Information Systems Security
Integration of a cryptographic file system and access control
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
Implementation of access control model for distributed information systems using usage control
SIIS'11 Proceedings of the 2011 international conference on Security and Intelligent Information Systems
Refactoring access control policies for performance improvement
ICPE '12 Proceedings of the 3rd ACM/SPEC International Conference on Performance Engineering
Multi-assignment clustering for boolean data
The Journal of Machine Learning Research
Intra-role progression in RBAC: an RPG-Like access control scheme
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
A healthcare information system with augmented access controls
APWeb'12 Proceedings of the 14th Asia-Pacific international conference on Web Technologies and Applications
Ensuring authorization privileges for cascading user obligations
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
The authorization leap from rights to attributes: maturation or chaos?
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Optimal workflow-aware authorizations
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Fine-grained access control of personal data
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
A trust-and-risk aware RBAC framework: tackling insider threat
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
SecTTS: A secure track & trace system for RFID-enabled supply chains
Computers in Industry
A social recommender mechanism for improving knowledge sharing in online forums
Information Processing and Management: an International Journal
The semantics of role-based trust management languages
CEE-SET'09 Proceedings of the 4th IFIP TC 2 Central and East European conference on Advances in Software Engineering Techniques
Enhancing directory virtualization to detect insider activity
Security and Communication Networks
A unified attribute-based access control model covering DAC, MAC and RBAC
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
HealthSec'12 Proceedings of the 3rd USENIX conference on Health Security and Privacy
Dynamic enforcement of abstract separation of duty constraints
ACM Transactions on Information and System Security (TISSEC)
RBAC-Matrix-Based EMR Right Management System to Improve HIPAA Compliance
Journal of Medical Systems
Recognition of authority in virtual organisations
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
Automated extraction of security policies from natural-language software documents
Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering
Conditional privacy-aware role based access control
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
A metamodel-based approach for analyzing security-design models
MODELS'07 Proceedings of the 10th international conference on Model Driven Engineering Languages and Systems
On the homonymous role in role-based discretionary access control
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Access control for semantic data federations in industrial product-lifecycle management
Computers in Industry
Modified hierarchical privacy-aware role based access control model
Proceedings of the 2012 ACM Research in Applied Computation Symposium
Architecture of context-aware integrated security management systems for smart home environment
APNOMS'07 Proceedings of the 10th Asia-Pacific conference on Network Operations and Management Symposium: managing next generation networks and services
RABAC: role-centric attribute-based access control
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
Role approach in access control development with the usage control concept
CISIM'12 Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management
Constraint-enhanced role engineering via answer set programming
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Toward a model-driven access-control enforcement mechanism for pervasive systems
Proceedings of the Workshop on Model-Driven Security
PASOAC-Net: a petri-net model to manage authorization in service-based business process
ICSOC'12 Proceedings of the 10th international conference on Service-Oriented Computing
FENCE: continuous access control enforcement in dynamic data stream environments
Proceedings of the third ACM conference on Data and application security and privacy
NSS'12 Proceedings of the 6th international conference on Network and System Security
A social network-based trust-aware propagation model for P2P systems
Knowledge-Based Systems
A formal role-based access control model for security policies in multi-domain mobile networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Mobi-CoSWAC: an access control approach for collaborative scientific workflow in mobile environment
ICPCA/SWS'12 Proceedings of the 2012 international conference on Pervasive Computing and the Networked World
Beyond accountability: using obligations to reduce risk exposure and deter insider attacks
Proceedings of the 18th ACM symposium on Access control models and technologies
An information flow control meta-model
Proceedings of the 18th ACM symposium on Access control models and technologies
Proceedings of the 18th ACM symposium on Access control models and technologies
Proceedings of the 18th ACM symposium on Access control models and technologies
Specification and analysis of access control policies for mobile applications
Proceedings of the 18th ACM symposium on Access control models and technologies
Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive computing systems
Engineering adaptive user interfaces for enterprise applications
Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive computing systems
Enabling dynamic security policy in the java security manager
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
Role mining algorithm evaluation and improvement in large volume android applications
Proceedings of the first international workshop on Security in embedded systems and smartphones
Consistency checking in privacy-aware access control
Proceedings of the 51st ACM Southeast Conference
Enforcing Minimum Necessary Access in Healthcare Through Integrated Audit and Access Control
Proceedings of the International Conference on Bioinformatics, Computational Biology and Biomedical Informatics
Towards purpose enforcement model for privacy-aware usage control policy in distributed healthcare
International Journal of Security and Networks
Toward mining of temporal roles
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
A model for trust-based access control and delegation in mobile clouds
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
Future Generation Computer Systems
A privacy-aware access control model for distributed network monitoring
Computers and Electrical Engineering
Consistency checking in access control
Proceedings of the 4th ACM conference on Data and application security and privacy
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication
Journal of Network and Computer Applications
Association-Based Active Access Control models with balanced scalability and flexibility
Computers in Industry
Contract RBAC in cloud computing
The Journal of Supercomputing
Future Generation Computer Systems
Information and Software Technology
Hi-index | 0.01 |
In this article we propose a standard for role-based access control (RBAC). Although RBAC models have received broad support as a generalized approach to access control, and are well recognized for their many advantages in performing large-scale authorization management, no single authoritative definition of RBAC exists today. This lack of a widely accepted model results in uncertainty and confusion about RBAC's utility and meaning. The standard proposed here seeks to resolve this situation by unifying ideas from a base of frequently referenced RBAC models, commercial products, and research prototypes. It is intended to serve as a foundation for product development, evaluation, and procurement specification. Although RBAC continues to evolve as users, researchers, and vendors gain experience with its application, we feel the features and components proposed in this standard represent a fundamental and stable set of mechanisms that may be enhanced by developers in further meeting the needs of their customers. As such, this document does not attempt to standardize RBAC features beyond those that have achieved acceptance in the commercial marketplace and research community, but instead focuses on defining a fundamental and stable set of RBAC components. This standard is organized into the RBAC Reference Model and the RBAC System and Administrative Functional Specification. The reference model defines the scope of features that comprise the standard and provides a consistent vocabulary in support of the specification. The RBAC System and Administrative Functional Specification defines functional requirements for administrative operations and queries for the creation, maintenance, and review of RBAC sets and relations, as well as for specifying system level functionality in support of session attribute management and an access control decision process.