Role-Based Access Control Models
Computer
Role templates for content-based access control
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Towards a more complete model of role
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
The role graph model and conflict of interest
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
A role-based access control model and reference implementation within a corporate intranet
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
The uses of role hierarchies in access control
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
An architecture for distributed OASIS services
IFIP/ACM International Conference on Distributed systems platforms
A model of OASIS role-based access control and its support for active security
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Access Rights Administration in Role-Based Security Systems
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
Framework for role-based delegation models
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Separation of Duty in Role-based Environments
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Toward open, secure, widely distributed services
Communications of the ACM - Adaptive middleware
A model of OASIS role-based access control and its support for active security
ACM Transactions on Information and System Security (TISSEC)
Trust for Ubiquitous, Transparent Collaboration
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Policies in Accountable Contracts
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Meta-Policies for Distributed Role-Based Access Control Systems
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
How much is "enough"? Risk in Trust-Based Access Control
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Role-based access control for publish/subscribe middleware architectures
Proceedings of the 2nd international workshop on Distributed event-based systems
An architecture for supporting vicarious learning in a distributed environment
Proceedings of the 2004 ACM symposium on Applied computing
Using trust and risk in role-based access control policies
Proceedings of the ninth ACM symposium on Access control models and technologies
Trust for ubiquitous, transparent collaboration
Wireless Networks - Special issue: Pervasive computing and communications
Context sensitive access control
Proceedings of the tenth ACM symposium on Access control models and technologies
Byzantine fault tolerant public key authentication in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
An integrated approach to federated identity and privilege management in open systems
Communications of the ACM - Spam and the ongoing battle for the inbox
Access control in publish/subscribe systems
Proceedings of the second international conference on Distributed event-based systems
Securing publish/subscribe for multi-domain systems
Proceedings of the ACM/IFIP/USENIX 2005 International Conference on Middleware
Byzantine fault tolerant public key authentication in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Evidence processing and privacy issues in evidence-based reputation systems
Computer Standards & Interfaces
Flexible secure inter-domain interoperability through attribute conversion
Information Sciences: an International Journal
Combining trust and risk to reduce the cost of attacks
iTrust'05 Proceedings of the Third international conference on Trust Management
Securing publish/subscribe for multi-domain systems
Middleware'05 Proceedings of the ACM/IFIP/USENIX 6th international conference on Middleware
Access control for semantic data federations in industrial product-lifecycle management
Computers in Industry
Hi-index | 0.00 |