Information Assurance: Dependability and Security in Networked Systems
Information Assurance: Dependability and Security in Networked Systems
BusiROLE: A Model for Integrating Business Roles into Identity Management
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
HyDRo --- Hybrid Development of Roles
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
From Access Control Policies to an Aspect-Based Infrastructure: A Metamodel-Based Approach
Models in Software Engineering
Formal Verification for Access Control in Web Information Sharing System
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
A UML profile for role-based access control
Proceedings of the 2nd international conference on Security of information and networks
V-model approach for role engineering
ICCOMP'09 Proceedings of the WSEAES 13th international conference on Computers
A closer look to the V-model approach for role engineering
WSEAS Transactions on Computers
Role-based access control (RBAC) in Java via proxy objects using annotations
Proceedings of the 15th ACM symposium on Access control models and technologies
A General Framework for Web Content Filtering
World Wide Web
Cryptography based access control in healthcare web systems
2010 Information Security Curriculum Development Conference
Relationship-based access control: protection model and policy language
Proceedings of the first ACM conference on Data and application security and privacy
Access control via belnap logic: Intuitive, expressive, and analyzable policy composition
ACM Transactions on Information and System Security (TISSEC)
Modeling process-related RBAC models with extended UML activity models
Information and Software Technology
Fuzzy Role-Based Access Control
Information Processing Letters
A framework for obligation fulfillment in REST services
Proceedings of the Second International Workshop on RESTful Design
Access Control for Databases: Concepts and Systems
Foundations and Trends in Databases
Deriving role engineering artifacts from business processes and scenario models
Proceedings of the 16th ACM symposium on Access control models and technologies
An integrated approach for identity and access management in a SOA context
Proceedings of the 16th ACM symposium on Access control models and technologies
A transformation contract to generate aspects from access control policies
Software and Systems Modeling (SoSyM)
Modeling norms in multi-agent systems with NormML
COIN@AAMAS'10 Proceedings of the 6th international conference on Coordination, organizations, institutions, and norms in agent systems
OTM'11 Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems - Volume Part I
Enforcing access control in workflow systems with a task engineering approach
International Journal of Internet Technology and Secured Transactions
A verifiable modeling approach to configurable role-based access control
FASE'10 Proceedings of the 13th international conference on Fundamental Approaches to Software Engineering
Role-based serializability for distributed object systems
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
A metamodel for the design of access-control policy enforcement managers: work in progress
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
Intra-role progression in RBAC: an RPG-Like access control scheme
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Adaptive access control enforcement in social network using aspect weaving
DASFAA'12 Proceedings of the 17th international conference on Database Systems for Advanced Applications
Minimizing insider misuse through secure Identity Management
Security and Communication Networks
Role-Based access control for model-driven web applications
ICWE'12 Proceedings of the 12th international conference on Web Engineering
Access control for semantic data federations in industrial product-lifecycle management
Computers in Industry
Transformation of spatio-temporal role based access control specification to alloy
MEDI'12 Proceedings of the 2nd international conference on Model and Data Engineering
Generic support for RBAC break-glass policies in process-aware information systems
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Secure federation of semantic information services
Decision Support Systems
Modelling context-aware RBAC models for mobile business processes
International Journal of Wireless and Mobile Computing
Hi-index | 0.00 |