Role-Based Access Control Models
Computer
The agile virtual enterprise: cases, metrics, tools
The agile virtual enterprise: cases, metrics, tools
Engineering authority and trust in cyberspace: the OM-AM and RBAC way
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
IEEE Internet Computing
PRO-VE '99 Proceedings of the IFIP TC5 WG5.3 / PRODNET Working Conference on Infrastructures for Virtual Enterprises: Networking Industrial Enterprises
Authorization and Attribute Certificates for Widely Distributed Access Control
WETICE '98 Proceedings of the 7th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Ontologies: A Silver Bullet for Knowledge Management and Electronic Commerce
Ontologies: A Silver Bullet for Knowledge Management and Electronic Commerce
Knowledge sharing in virtual enterprises via an ontology-based access control approach
Computers in Industry
International Journal of Computer Integrated Manufacturing
Enabling secure service discovery in mobile healthcare enterprise networks
IEEE Wireless Communications - Special issue title on applications and support technical for mobility and enterprise services
Enterprises as systems: Context, boundaries, and practical implications
Information-Knowledge-Systems Management
Security concerns for web services and applications
ASIAN'05 Proceedings of the 10th Asian Computing Science conference on Advances in computer science: data management on the web
Hi-index | 0.00 |
Combining distributed role-based access control with a public key infrastructure can facilitate secure, flexible data access in environments where enterprises collaborate via Web services.