Role-Based Access Control Models
Computer
Controlled access and dissemination of XML documents
Proceedings of the 2nd international workshop on Web information and data management
Configuring role-based access control to enforce mandatory and discretionary access control policies
ACM Transactions on Information and System Security (TISSEC)
Security models for web-based applications
Communications of the ACM
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
A fine-grained access control system for XML documents
ACM Transactions on Information and System Security (TISSEC)
Access-Control Language for Multidomain Environments
IEEE Internet Computing
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
ACM Transactions on Information and System Security (TISSEC)
IEEE Transactions on Dependable and Secure Computing
Web services enterprise security architecture: a case study
Proceedings of the 2005 workshop on Secure web services
Distributed multimedia information systems: an end-to-end perspective
Multimedia Tools and Applications
Authentication and authorization user management within a collaborative community
ICCOMP'07 Proceedings of the 11th WSEAS International Conference on Computers
Secure distribution and access of XML documents
International Journal of High Performance Computing and Networking
Preventing conflict situations during authorization
WSEAS Transactions on Computers
Belnap's Logic in Sharing Protected Web Resources
KES '07 Knowledge-Based Intelligent Information and Engineering Systems and the XVII Italian Workshop on Neural Networks on Proceedings of the 11th International Conference
Proceedings of the 4th International Conference on Design Science Research in Information Systems and Technology
Description of Temporal Constraints Using Semantic Web in Role-Based Access Control
Proceedings of the 2006 conference on Knowledge-Based Software Engineering: Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering
The practical application of a process for eliciting and designing security in web service systems
Information and Software Technology
Positive and negative authorizations to access protected web resources
NBiS'07 Proceedings of the 1st international conference on Network-based information systems
Authorization control in collaborative healthcare systems
Journal of Theoretical and Applied Electronic Commerce Research
SecurOntology: A semantic web access control framework
Computer Standards & Interfaces
Sharing protected web resources using distributed role-based modeling
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
Sec-shield: security preserved distributed knowledge management between autonomous domains
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Authorization in cross-border eHealth systems
Information Systems Frontiers
Hi-index | 4.11 |
Web services provide standard protocols for document exchange among data repositories. At the same time, they expose data and functionality to risks that traditional security models do not address. An XML-based specification language provides content-based, context-aware document access that models the elements of role-based access-control. The model provides explicit support for conceptual level access control on underlying data repositories as well as dynamic updates of user profiles. The authors have validated the model and implemented a software architecture that disseminates secure documents for a single-enterprise Web services application.