Role-Based Access Control Models
Computer
Mandatory access control and role-based access control revisited
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Determining role rights from use cases
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Design systolic systems: Illustrating of regular algorithms on synchronous array processors
Design systolic systems: Illustrating of regular algorithms on synchronous array processors
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Decentralized user-role assignment for Web-based intranets
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
The role graph model and conflict of interest
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
A role-based access control model and reference implementation within a corporate intranet
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
Modeling users in role-based access control
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Engineering authority and trust in cyberspace: the OM-AM and RBAC way
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Configuring role-based access control to enforce mandatory and discretionary access control policies
ACM Transactions on Information and System Security (TISSEC)
Panel: which access control technique will provide the greatest overall benefit
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
A model of OASIS role-based access control and its support for active security
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
An argument for the role-based access control model
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Role-based access control on the web
ACM Transactions on Information and System Security (TISSEC)
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
Information flow analysis of an RBAC system
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A graph-based formalism for RBAC
ACM Transactions on Information and System Security (TISSEC)
A model of OASIS role-based access control and its support for active security
ACM Transactions on Information and System Security (TISSEC)
Integrating role graphs: a tool for security integration
Data & Knowledge Engineering - Data and applications security
Access Control and Trust in the Use of Widely Distributed Services
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
Using NFS to Implement Role-Based Access Control
WET-ICE '97 Proceedings of the 6th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises
Cooperative role-based administration
Proceedings of the eighth ACM symposium on Access control models and technologies
A methodology for managing roles in legacy systems
Proceedings of the eighth ACM symposium on Access control models and technologies
Access control and trust in the use of widely distributed services
Software—Practice & Experience - Special issue: Middleware
Implementing role based access control for federated information systems on the web
ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21
Rights protection for relational data
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Policy Storage for Role-Based Access Control Systems
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Modular authorization and administration
ACM Transactions on Information and System Security (TISSEC)
Rights Protection for Relational Data
IEEE Transactions on Knowledge and Data Engineering
Providing flexible access control to an information flow control model
Journal of Systems and Software
Preventing information leakage within workflows that execute among competing organizations
Journal of Systems and Software - Special issue: Software engineering education and training
Rights Protection for Categorical Data
IEEE Transactions on Knowledge and Data Engineering
Query execution assurance for outsourced databases
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Delegation in the role graph model
Proceedings of the eleventh ACM symposium on Access control models and technologies
Formal foundations for hybrid hierarchies in GTRBAC
ACM Transactions on Information and System Security (TISSEC)
A Methodology for Bridging between RBAC and an Arbitrary Application Program
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
Joining privately on outsourced data
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
Detection of access control flaws in a distributed database system with local site autonomy
IDEAS'97 Proceedings of the 1997 international conference on International database engineering and applications symposium
Types for security in a mobile world
TGC'05 Proceedings of the 1st international conference on Trustworthy global computing
Mixing privacy with role-based access control
Proceedings of The Fourth International C* Conference on Computer Science and Software Engineering
A flexible privilege management scheme for role graph model
PARA'04 Proceedings of the 7th international conference on Applied Parallel Computing: state of the Art in Scientific Computing
Conflict of interest in the administrative role graph model
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Subset selection approach for watermarking relational databases
ICDEM'10 Proceedings of the Second international conference on Data Engineering and Management
A new RBAC based access control model for cloud computing
GPC'12 Proceedings of the 7th international conference on Advances in Grid and Pervasive Computing
On the homonymous role in role-based discretionary access control
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Hi-index | 0.00 |