RBAC '97 Proceedings of the second ACM workshop on Role-based access control
The role graph model and conflict of interest
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
The specification and enforcement of authorization constraints in workflow management systems
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
An object-oriented model of access control based on role
ACM SIGSOFT Software Engineering Notes
Security models for web-based applications
Communications of the ACM
Access control mechanisms for inter-organizational workflow
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
A model of OASIS role-based access control and its support for active security
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Design and implementation of a flexible RBAC-service in an object-oriented scripting language
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Models for coalition-based access control (CBAC)
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A role-based delegation framework for healthcare information systems
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A task-based security model to facilitate collaboration in trusted multi-agency networks
Proceedings of the 2002 ACM symposium on Applied computing
A model of OASIS role-based access control and its support for active security
ACM Transactions on Information and System Security (TISSEC)
A logical framework for reasoning about access control models
ACM Transactions on Information and System Security (TISSEC)
Visual Authorization Modeling in E-commerce Applications
IEEE MultiMedia
MIERA: Method for Inter-Enterprise Role-Based Authorization
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
Future Directions in Role-Based Access Control Models
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Task-Role Based Access Control (T-RBAC): An Improved Access Control Model for Enterprise Environment
DEXA '00 Proceedings of the 11th International Conference on Database and Expert Systems Applications
An approach to engineer and enforce context constraints in an RBAC environment
Proceedings of the eighth ACM symposium on Access control models and technologies
Dynamic and risk-aware network access management
Proceedings of the eighth ACM symposium on Access control models and technologies
Secure role-based workflow models
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Task-role-based access control model
Information Systems
Workflow-based Authorization Service in Grid
GRID '03 Proceedings of the 4th International Workshop on Grid Computing
Defeating Internet Attacks Using Risk Awareness and Active Honeypots
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
An integrated approach to engineer and enforce context constraints in RBAC environments
ACM Transactions on Information and System Security (TISSEC)
Separation of duties for access control enforcement in workflow environments
IBM Systems Journal - End-to-end security
SOWAC: A Service-Oriented Workflow Access Control Model
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
An Access Control Model for Web Services in Business Process
WI '04 Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence
Modeling and Analyzing of Workflow Authorization Management
Journal of Network and Systems Management
Access control in collaborative systems
ACM Computing Surveys (CSUR)
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
Preventing information leakage within workflows that execute among competing organizations
Journal of Systems and Software - Special issue: Software engineering education and training
DPE/PAC: decentralized process engine with product access control
Journal of Systems and Software
Characterizing dynamics of information leakage in security-sensitive software process
ACSW Frontiers '05 Proceedings of the 2005 Australasian workshop on Grid computing and e-research - Volume 44
An information flow control model for C applications based on access control lists
Journal of Systems and Software
A taxonomy of Data Grids for distributed data sharing, management, and processing
ACM Computing Surveys (CSUR)
The secondary and approximate authorization model and its application to Bell-LaPadula policies
Proceedings of the eleventh ACM symposium on Access control models and technologies
Managing role relationships in an information flow control model
Journal of Systems and Software
Flooding and recycling authorizations
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
An extended RBAC profile of XACML
Proceedings of the 3rd ACM workshop on Secure web services
Modeling Delegation through an i*-based Approach
IAT '06 Proceedings of the IEEE/WIC/ACM international conference on Intelligent Agent Technology
Toward a Usage-Based Security Framework for Collaborative Computing Systems
ACM Transactions on Information and System Security (TISSEC)
A formalism for visual security protocol modeling
Journal of Visual Languages and Computing
Supporting selective information sharing with people-tagging
CHI '08 Extended Abstracts on Human Factors in Computing Systems
Enforcing security properties in task-based systems
Proceedings of the 13th ACM symposium on Access control models and technologies
Task-based entailment constraints for basic workflow patterns
Proceedings of the 13th ACM symposium on Access control models and technologies
The CRUTIAL Architecture for Critical Information Infrastructures
Architecting Dependable Systems V
Supporting dynamic administration of RBAC in web-based collaborative applications during run-time
International Journal of Information and Computer Security
A Flexible Access Control Model for Dynamic Workflow Using Extended WAM and RBAC
Computer Supported Cooperative Work in Design IV
Integrating usage control with SIP-based communications
Journal of Computer Systems, Networks, and Communications
Dynamic, context-aware, least-privilege grid delegation
GRID '07 Proceedings of the 8th IEEE/ACM International Conference on Grid Computing
Model-driven business process security requirement specification
Journal of Systems Architecture: the EUROMICRO Journal
Security architecture for virtual organizations of business web services
Journal of Systems Architecture: the EUROMICRO Journal
Improving personal privacy in social systems with people-tagging
Proceedings of the ACM 2009 international conference on Supporting group work
Verification of Business Process Entailment Constraints Using SPIN
ESSoS '09 Proceedings of the 1st International Symposium on Engineering Secure Software and Systems
Task-activity based access control for process collaboration environments
Computers in Industry
A Delegation Logic Based Authorization Mechanism for Virtual Organizations
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
Role based access control for a medical database
SEA '07 Proceedings of the 11th IASTED International Conference on Software Engineering and Applications
Access Control of Cloud Service Based on UCON
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
Access control for workflow environment: the RTFW model
CSCWD'06 Proceedings of the 10th international conference on Computer supported cooperative work in design III
A composite-service authorization prediction platform for grid environment
CDVE'07 Proceedings of the 4th international conference on Cooperative design, visualization, and engineering
Secure workflow execution in grid environments
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Modeling of task-based authorization constraints in BPMN
BPM'07 Proceedings of the 5th international conference on Business process management
Authorization control in collaborative healthcare systems
Journal of Theoretical and Applied Electronic Commerce Research
An access control model for mobile physical objects
Proceedings of the 15th ACM symposium on Access control models and technologies
Architecture of context-aware workflow authorization management systems for workflow-based systems
APNOMS'09 Proceedings of the 12th Asia-Pacific network operations and management conference on Management enabling the future internet for changing business and new computing services
A security framework for a workflow-based grid development platform
Computer Standards & Interfaces
Detection of anomalous insiders in collaborative environments via relational analysis of access logs
Proceedings of the first ACM conference on Data and application security and privacy
Modeling process-related RBAC models with extended UML activity models
Information and Software Technology
Integrating constraints to support legally flexible business processes
Information Systems Frontiers
Dynamic access control administration for collaborative applications
ICCOMP'06 Proceedings of the 10th WSEAS international conference on Computers
Types for security in a mobile world
TGC'05 Proceedings of the 1st international conference on Trustworthy global computing
DC proposal: knowledge based access control policy specification and enforcement
ISWC'11 Proceedings of the 10th international conference on The semantic web - Volume Part II
From business process choreography to authorization policies
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Security-aware web service composition approaches: state-of-the-art
Proceedings of the 13th International Conference on Information Integration and Web-based Applications and Services
Flexible workflow incorporated with RBAC
CSCWD'05 Proceedings of the 9th international conference on Computer Supported Cooperative Work in Design II
Person-Wise privacy level access control for personal information directory services
EUC'06 Proceedings of the 2006 international conference on Embedded and Ubiquitous Computing
Access control requirements for preventing insider threats
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
A relational database integrity framework for access control policies
Journal of Intelligent Information Systems
Enforcing access control in workflow systems with a task engineering approach
International Journal of Internet Technology and Secured Transactions
Task-Based access control for virtual organizations
FIDJI'04 Proceedings of the 4th international conference on Scientific Engineering of Distributed Java Applications
FORBAC: a flexible organisation and role-based access control model for secure information systems
ADVIS'06 Proceedings of the 4th international conference on Advances in Information Systems
Towards a formal specification method for enterprise information system security
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Performance analysis for workflow management systems under role-based authorization control
GPC'12 Proceedings of the 7th international conference on Advances in Grid and Pervasive Computing
Challenges in ehealth: from enabling to enforcing privacy
FHIES'11 Proceedings of the First international conference on Foundations of Health Informatics Engineering and Systems
Access control for semantic data federations in industrial product-lifecycle management
Computers in Industry
Information Systems and e-Business Management
Mobi-CoSWAC: an access control approach for collaborative scientific workflow in mobile environment
ICPCA/SWS'12 Proceedings of the 2012 international conference on Pervasive Computing and the Networked World
An information flow control meta-model
Proceedings of the 18th ACM symposium on Access control models and technologies
Generic support for RBAC break-glass policies in process-aware information systems
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Implementing an enterprise business context model for defining mobile broadband policy
Proceedings of the 8th International Conference on Network and Service Management
Association-Based Active Access Control models with balanced scalability and flexibility
Computers in Industry
Future Generation Computer Systems
Information and Software Technology
Hi-index | 0.02 |