Role-based security: pros, cons, & some research directions
ACM SIGSAC Review
Role-based security, object oriented databases and separation of duty
ACM SIGMOD Record
CSC '93 Proceedings of the 1993 ACM conference on Computer science
Towards a framework for integrating multilevel secure models and temporal data models
CIKM '94 Proceedings of the third international conference on Information and knowledge management
A role-based access control model for protection domain derivation and management
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
RBAC support in object-oriented role databases
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Role templates for content-based access control
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Constraints for role-based access control
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Requirements of role-based access control for collaborative systems
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
The role graph model and conflict of interest
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
The NIST model for role-based access control: towards a unified standard
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Engineering authority and trust in cyberspace: the OM-AM and RBAC way
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Panel: which access control technique will provide the greatest overall benefit
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
An argument for the role-based access control model
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
Secure internet access to medical data
Knowledge media in healthcare
A Formal Model for Role-Based Access Control with Constraints
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Role-based information security: change management issues
ISICT '04 Proceedings of the 2004 international symposium on Information and communication technologies
Programming versus databases in the object-oriented paradigm
Information and Software Technology
Hi-index | 0.00 |