Building Groupwares over Duplicated Object Systems
CRIWG '02 Proceedings of the 8th International Workshop on Groupware: Design, Implementation and Use
The HP time vault service: exploiting IBE for timed release of confidential information
WWW '03 Proceedings of the 12th international conference on World Wide Web
Technology and Health Care
Proceedings of the ninth ACM symposium on Access control models and technologies
On mutually-exclusive roles and separation of duty
Proceedings of the 11th ACM conference on Computer and communications security
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
Verification and change-impact analysis of access-control policies
Proceedings of the 27th international conference on Software engineering
Rule support for role-based access control
Proceedings of the tenth ACM symposium on Access control models and technologies
SERAT: SEcure role mApping technique for decentralized secure interoperability
Proceedings of the tenth ACM symposium on Access control models and technologies
Articulating and enforcing authorisation policies with UML and OCL
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
SchedSP: a Grid-based application service provider of scheduling solutions: Research Articles
Software—Practice & Experience
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
Secure collaboration in mediator-free environments
Proceedings of the 12th ACM conference on Computer and communications security
Applying hierarchical and role-based access control to XML documents
SWS '04 Proceedings of the 2004 workshop on Secure web service
Constraint generation for separation of duty
Proceedings of the eleventh ACM symposium on Access control models and technologies
A model-checking approach to analysing organisational controls in a loan origination process
Proceedings of the eleventh ACM symposium on Access control models and technologies
Support of subscribers' certificates in a hybrid WLAN-3G environment
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Holistic Approach to Security Policies -- Policy Distribution with XACML over COPS
Electronic Notes in Theoretical Computer Science (ENTCS)
Extended privilege inheritance in RBAC
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
On mutually exclusive roles and separation-of-duty
ACM Transactions on Information and System Security (TISSEC)
Visual modeling and formal specification of constraints of RBAC using semantic web technology
Knowledge-Based Systems
Requirements for scalable access control and security management architectures
ACM Transactions on Internet Technology (TOIT)
Flexible and efficient access control in oracle
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Access control models and security labelling
ACSC '07 Proceedings of the thirtieth Australasian conference on Computer science - Volume 62
Ranking factors in peer-to-peer overlay networks
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Context handling in a pervasive computing system framework
Mobility '06 Proceedings of the 3rd international conference on Mobile technology, applications & systems
Web services discovery in secure collaboration environments
ACM Transactions on Internet Technology (TOIT)
Feasibility and benefits of migrating towards JEE: a real life case
Proceedings of the 5th international symposium on Principles and practice of programming in Java
A simple and expressive semantic framework for policy composition in access control
Proceedings of the 2007 ACM workshop on Formal methods in security engineering
Authentication and authorization user management within a collaborative community
ICCOMP'07 Proceedings of the 11th WSEAS International Conference on Computers
Workflow authorisation in mediator-free environments
International Journal of Security and Networks
Knowledge sharing in virtual enterprises via an ontology-based access control approach
Computers in Industry
RBAC administration in distributed systems
Proceedings of the 13th ACM symposium on Access control models and technologies
Purpose based access control for privacy protection in relational database systems
The VLDB Journal — The International Journal on Very Large Data Bases
Security enhanced Linux to enforce mandatory access control in health information systems
HDKM '08 Proceedings of the second Australasian workshop on Health data and knowledge management - Volume 80
Federated integration of networked manufacturing service platforms
Advanced Engineering Informatics
Preventing information leakage between collaborating organisations
Proceedings of the 10th international conference on Electronic commerce
Describing access control models as design patterns using roles
Proceedings of the 2006 conference on Pattern languages of programs
Sharing but Protecting Content Against Internal Leakage for Organisations
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Preventing Illegal Information Flow Based on Role-Based Access Control Model
NBiS '08 Proceedings of the 2nd international conference on Network-Based Information Systems
Building the Agile Enterprise: With SOA, BPM and MBM
Building the Agile Enterprise: With SOA, BPM and MBM
Preventing conflict situations during authorization
WSEAS Transactions on Computers
PuRBAC: Purpose-Aware Role-Based Access Control
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
Belnap's Logic in Sharing Protected Web Resources
KES '07 Knowledge-Based Intelligent Information and Engineering Systems and the XVII Italian Workshop on Neural Networks on Proceedings of the 11th International Conference
Requirements for a location-based access control model
Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia
Requirements-based Access Control Analysis and Policy Specification (ReCAPS)
Information and Software Technology
An engineering process for developing Secure Data Warehouses
Information and Software Technology
Scalable access controls for lineage
TAPP'09 First workshop on on Theory and practice of provenance
Separation of Duty in Trust-Based Collaboration
Information Security and Cryptology
A purpose-based synchronisation protocol of multiple transactions in multi-agent systems
International Journal of Business Intelligence and Data Mining
A UML 2.0 profile to define security requirements for Data Warehouses
Computer Standards & Interfaces
A legal information flow (LIF) scheduler based on role-based access control model
Computer Standards & Interfaces
Description of Temporal Constraints Using Semantic Web in Role-Based Access Control
Proceedings of the 2006 conference on Knowledge-Based Software Engineering: Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering
Proceedings of the 2007 conference on New Trends in Software Methodologies, Tools and Techniques: Proceedings of the sixth SoMeT_07
Trustworthiness of acquaintances in Peer-to-Peer overlay networks
International Journal of High Performance Computing and Networking
A keyless facility access control system with wireless enabled personal devices
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
Comprehensive life cycle support for access rules in information systems: the CEOSIS project
Enterprise Information Systems - Towards Model-driven Service-oriented Enterprise Computing - 12th International IEEE EDOC Enterprise Computing Conference (EDOC 2008)
Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control
ISC '09 Proceedings of the 12th International Conference on Information Security
The OPL Access Control Policy Language
TrustBus '09 Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business
Role based access control for a medical database
SEA '07 Proceedings of the 11th IASTED International Conference on Software Engineering and Applications
Preserving SQL access control policies over published XML data
Proceedings of the 2009 EDBT/ICDT Workshops
Positive and negative authorizations to access protected web resources
NBiS'07 Proceedings of the 1st international conference on Network-based information systems
Role-based scheduling and synchronization algorithms to prevent illegal information flow
NBiS'07 Proceedings of the 1st international conference on Network-based information systems
Refinement for administrative policies
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Management advantages of object classification in role-based access control (RBAC)
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Mediator-free secure policy interoperation of exclusively-trusted multiple domains
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Access control requirements for processing electronic health records
BPM'07 Proceedings of the 2007 international conference on Business process management
A formal framework for adaptive access control models
Journal on data semantics IX
Security ontology to facilitate web service description and discovery
Journal on data semantics IX
Trust and privacy in attribute based access control for collaboration environments
Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services
Towards formal specification and verification of a role-based authorization engine using JML
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems
Access control policy translation and verification within heterogeneous data federations
Proceedings of the 15th ACM symposium on Access control models and technologies
Towards a theory of accountability and audit
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Securing enterprise wide authorization management through delegation
ACE'10 Proceedings of the 9th WSEAS international conference on Applications of computer engineering
WSEAS Transactions on Information Science and Applications
Scalable and efficient reasoning for enforcing role-based access control
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Attribute-Based Messaging: Access Control and Confidentiality
ACM Transactions on Information and System Security (TISSEC)
MyABDAC: compiling XACML policies for attribute-based database access control
Proceedings of the first ACM conference on Data and application security and privacy
An empirical assessment of approaches to distributed enforcement in role-based access control (RBAC)
Proceedings of the first ACM conference on Data and application security and privacy
A language for provenance access control
Proceedings of the first ACM conference on Data and application security and privacy
Access nets: modeling access to physical spaces
VMCAI'11 Proceedings of the 12th international conference on Verification, model checking, and abstract interpretation
Automatic conformance checking of role-based access control policies via alloy
ESSoS'11 Proceedings of the Third international conference on Engineering secure software and systems
Semi-automatic synthesis of security policies by invariant-guided abduction
FAST'10 Proceedings of the 7th International conference on Formal aspects of security and trust
Remote Patient Monitoring Within a Future 5G Infrastructure
Wireless Personal Communications: An International Journal
An authorization scheme for version control systems
Proceedings of the 16th ACM symposium on Access control models and technologies
Validation of security policies by the animation of Z specifications
Proceedings of the 16th ACM symposium on Access control models and technologies
Role-based access to facilities lifecycle information on RFID tags
Advanced Engineering Informatics
Role-based secure inter-operation and resource usage management in mobile grid systems
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Modularisation in maude of parametrized RBAC for row level access control
ADBIS'11 Proceedings of the 15th international conference on Advances in databases and information systems
ACM Transactions on Information and System Security (TISSEC)
Automatic error finding in access-control policies
Proceedings of the 18th ACM conference on Computer and communications security
Combining UML, ASTD and B for the formal specification of an access control filter
Innovations in Systems and Software Engineering
Context-Role based access control for context-aware application
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
λ-RBAC: programming with role-based access control
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Balancing flexibility and security in adaptive process management systems
OTM'05 Proceedings of the 2005 Confederated international conference on On the Move to Meaningful Internet Systems - Volume >Part I
On the controlled evolution of access rules in cooperative information systems
OTM'05 Proceedings of the 2005 Confederated international conference on On the Move to Meaningful Internet Systems - Volume >Part I
UML-based enhanced rich form generation
Proceedings of the 2011 ACM Symposium on Research in Applied Computation
Role activation management in role based access control
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
The conflict detection between permission assignment constraints in role-based access control
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Sharing protected web resources using distributed role-based modeling
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
A relational database integrity framework for access control policies
Journal of Intelligent Information Systems
Formalising and validating RBAC-to-XACML translation using lightweight formal methods
ABZ'10 Proceedings of the Second international conference on Abstract State Machines, Alloy, B and Z
Context-Aware access control mechanism for ubiquitous applications
AWIC'05 Proceedings of the Third international conference on Advances in Web Intelligence
Inconsistency detection of authorization policies in distributed component environment
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Cellular automata based role-delegation in RBAC
ACRI'06 Proceedings of the 7th international conference on Cellular Automata for Research and Industry
Verification of UML-Based security policy model
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
Secure role activation and authorization in the enterprise environment
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Conformance checking of RBAC policy and its implementation
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Guarding a walled garden — semantic privacy preferences for the social web
ESWC'10 Proceedings of the 7th international conference on The Semantic Web: research and Applications - Volume Part II
Safety problems in access control with temporal constraints
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Specification and validation of authorisation constraints using UML and OCL
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
ICGT'06 Proceedings of the Third international conference on Graph Transformations
Security ontology for annotating resources
OTM'05 Proceedings of the 2005 OTM Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, COA, and ODBASE - Volume Part II
Delegation in role-based access control
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Representation and reasoning on role-based access control policies with conceptual graphs
ICCS'06 Proceedings of the 14th international conference on Conceptual Structures: inspiration and Application
Attribute delegation based on ontologies and context information
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
A security management information model derivation framework: from goals to configurations
FAST'05 Proceedings of the Third international conference on Formal Aspects in Security and Trust
SP 800-36. Guide to Selecting Information Technology Security Products
SP 800-36. Guide to Selecting Information Technology Security Products
Specification and verification of access control policies in EB3SEC: work in progress
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
Non-linear and non-group cellular automata chaining technique for cryptographic applications
Mathematical and Computer Modelling: An International Journal
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
Engineering Financial Enterprise Content Management Services: Integration and Control
International Journal of Systems and Service-Oriented Engineering
Mohawk: Abstraction-Refinement and Bound-Estimation for Verifying Access Control Policies
ACM Transactions on Information and System Security (TISSEC)
Comprehensive rule-based compliance checking and risk management with process mining
Decision Support Systems
Engineering Security Agreements Against External Insider Threat
Information Resources Management Journal
Ontology-based access control model for security policy reasoning in cloud computing
The Journal of Supercomputing
Hi-index | 0.00 |