Role-Based Access Control Models
Computer
On specifying security policies for web documents with an XML-based language
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Role-based access control on the web
ACM Transactions on Information and System Security (TISSEC)
RBAC Policies in XML for X.509 Based Privilege Management
SEC '02 Proceedings of the IFIP TC11 17th International Conference on Information Security: Visions and Perspectives
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
TrustBAC: integrating trust relationships into the RBAC model for access control in open systems
Proceedings of the eleventh ACM symposium on Access control models and technologies
Privacy Preserving Trust Authorization Framework Using XACML
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Token-based dynamic trust establishment for web services
Proceedings of the 43rd annual Southeast regional conference - Volume 2
A survey of autonomic communications
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
A network access control approach based on the AAA architecture and authorization attributes
Journal of Network and Computer Applications
Journal of Parallel and Distributed Computing - Special issue: Security in grid and distributed systems
Information Security Tech. Report
Secure web service federation management using tpm virtualisation
Proceedings of the 2007 ACM workshop on Secure web services
Requirements of federated trust management for service-oriented architectures
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Dynamic, context-aware, least-privilege grid delegation
GRID '07 Proceedings of the 8th IEEE/ACM International Conference on Grid Computing
Achieving DRBAC Authorization in Multi-trust Domains with MAS Architecture and PMI
Agent Computing and Multi-Agent Systems
Dynamic VO Establishment in Distributed Heterogeneous Business Environments
ICCS 2009 Proceedings of the 9th International Conference on Computational Science
Use of XACML Policies for a Network Access Control Service
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
Safety High Accuracy Context-Aware Matrix (CAM) Making Based on X.509 Proxy Certificate
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Authorisation in Grid computing
Information Security Tech. Report
The Journal of Supercomputing
A security framework for a workflow-based grid development platform
Computer Standards & Interfaces
Instant certificate revocation and publication using WebDAV
Journal of Computer Security - The 2007 European PKI Workshop: Theory and Practice (EuroPKI'07)
ACM Computing Surveys (CSUR)
Expert Systems with Applications: An International Journal
Role-based secure inter-operation and resource usage management in mobile grid systems
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Dynamic authorization of grid based on trust mechanism
WISM'11 Proceedings of the 2011 international conference on Web information systems and mining - Volume Part I
Family gene based grid trust model
ICNC'06 Proceedings of the Second international conference on Advances in Natural Computation - Volume Part II
Enabling cutting-edge semiconductor simulation through grid technology
LSSC'09 Proceedings of the 7th international conference on Large-Scale Scientific Computing
A heterogeneous network access service based on PERMIS and SAML
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Modeling public key infrastructures in the real world
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Development of a flexible PERMIS authorisation module for shibboleth and apache server
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Experiences of applying advanced grid authorisation infrastructures
EGC'05 Proceedings of the 2005 European conference on Advances in Grid Computing
The semantics of role-based trust management languages
CEE-SET'09 Proceedings of the 4th IFIP TC 2 Central and East European conference on Advances in Software Engineering Techniques
A unified attribute-based access control model covering DAC, MAC and RBAC
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Extending the common services of eduGAIN with a credential conversion service
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Using WebDAV for improved certificate revocation and publication
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
RABAC: role-centric attribute-based access control
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
Hi-index | 0.00 |
The Permis privilege management infrastructure is a role-based access control system that uses XML-based local policies and a Java API.