Handbook of graph grammars and computing by graph transformation: volume I. foundations
Handbook of graph grammars and computing by graph transformation: volume I. foundations
Formal specification for role based access control user/role and role/role relationship management
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
The role graph model and conflict of interest
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
The ARBAC97 model for role-based administration of roles
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
Handbook of graph grammars and computing by graph transformation: vol. 2: applications, languages, and tools
The AGG approach: language and environment
Handbook of graph grammars and computing by graph transformation
The NIST model for role-based access control: towards a unified standard
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Role-based authorization constraints specification
ACM Transactions on Information and System Security (TISSEC)
A graph-based formalism for RBAC
ACM Transactions on Information and System Security (TISSEC)
A Formal Model for Role-Based Access Control Using Graph Transformation
ESORICS '00 Proceedings of the 6th European Symposium on Research in Computer Security
Administrative scope: A foundation for role-based administrative models
ACM Transactions on Information and System Security (TISSEC)
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
Security analysis in role-based access control
ACM Transactions on Information and System Security (TISSEC)
Graph-theoretic method for merging security system specifications
Information Sciences: an International Journal
Distributed and Parallel Databases
A Consensus-Based Integration Method for Security Rules
KES '09 Proceedings of the 13th International Conference on Knowledge-Based and Intelligent Information and Engineering Systems: Part I
A contribution to user interface modelling based on graph transformations approach
Proceedings of the International Workshop on Enterprises & Organizational Modeling and Simulation
Integration of graph based authorization policies
ISMIS'06 Proceedings of the 16th international conference on Foundations of Intelligent Systems
Using π-calculus to formalize domain administration of RBAC
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Implementing authorization delegations using graph
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
A new RBAC based access control model for cloud computing
GPC'12 Proceedings of the 7th international conference on Advances in Grid and Pervasive Computing
Hi-index | 0.00 |
The use of the graph-based framework to specify the administration of RBAC systems has several advantages, from the intuition provided by the visual aspect to the precise semantics and the systematic verification of constraints. Here the benefits of this framework are illustrated using SARBAC (scoped administration of role based access control), providing the first steps towards its operational semantics and a more expressive constraint language.