The category concept: an extension to the entity-relationship model
Data & Knowledge Engineering
Role-Based Access Control Models
Computer
Distributed Systems: Concepts and Design
Distributed Systems: Concepts and Design
Using agents for secure access to data in the Internet
IEEE Communications Magazine
Decentralized user-role assignment for Web-based intranets
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Security models for web-based applications
Communications of the ACM
Design and implementation of a flexible RBAC-service in an object-oriented scripting language
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Web Document Access Control Using Two-Layered Storage Structures with RBAC Server
EurAsia-ICT '02 Proceedings of the First EurAsian Conference on Information and Communication Technology
Information Flow Control among Objects in Role-Based Access Control Model
DEXA '01 Proceedings of the 12th International Conference on Database and Expert Systems Applications
On modeling system-centric information for role engineering
Proceedings of the eighth ACM symposium on Access control models and technologies
Design and implementation of a fine-grained menu control processor for web-based information systems
Future Generation Computer Systems - Selected papers on theoretical and computational aspects of structural dynamical systems in linear algebra and control
Embedding role-based access control model in object-oriented systems to protect privacy
Journal of Systems and Software
Providing flexible access control to an information flow control model
Journal of Systems and Software
Concurrency control based on role concept
International Journal of High Performance Computing and Networking
Preventing Illegal Information Flow Based on Role-Based Access Control Model
NBiS '08 Proceedings of the 2nd international conference on Network-Based Information Systems
A purpose-based synchronisation protocol of multiple transactions in multi-agent systems
International Journal of Business Intelligence and Data Mining
A legal information flow (LIF) scheduler based on role-based access control model
Computer Standards & Interfaces
Applying RBAC providing restricted permission inheritance to a corporate web environment
APWeb'03 Proceedings of the 5th Asia-Pacific web conference on Web technologies and applications
Role-based scheduling and synchronization algorithms to prevent illegal information flow
NBiS'07 Proceedings of the 1st international conference on Network-based information systems
Role-based serializability for distributed object systems
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
The Secure Authorization Model for Healthcare Information System
Journal of Medical Systems
Hi-index | 0.02 |
Secure intranets are founded on the protection of logical resources accessible in corporate enterprises. The paper discusses I-RBAC, role-based access control for intranet security which offers efficient security management based on varied levels of role authorizations