|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 936 occurrences of 345 keywords
|
|
|
Results
Found 1029 publication records. Showing 1029 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
119 | Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta |
Security validation tool for business processes. |
SACMAT |
2011 |
DBLP DOI BibTeX RDF |
|
117 | Ravi S. Sandhu, David F. Ferraiolo, D. Richard Kuhn |
The NIST model for role-based access control: towards a unified standard. |
ACM Workshop on Role-Based Access Control |
2000 |
DBLP DOI BibTeX RDF |
|
110 | David F. Ferraiolo, Ravi S. Sandhu, Serban I. Gavrila, D. Richard Kuhn, Ramaswamy Chandramouli |
Proposed NIST standard for role-based access control. |
ACM Trans. Inf. Syst. Secur. |
2001 |
DBLP DOI BibTeX RDF |
security, access control, standards, Role-based access control, authorization management |
110 | Ravi S. Sandhu |
Future Directions in Role-Based Access Control Models. |
MMM-ACNS |
2001 |
DBLP DOI BibTeX RDF |
|
101 | Ali E. Abdallah, Etienne J. Khayat |
A Formal Model for Parameterized Role-Based Access Control. |
Formal Aspects in Security and Trust |
2004 |
DBLP DOI BibTeX RDF |
|
96 | Yong-Zhong He, Zhen Han, Ye Du |
Context Active RBAC and its Applications. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
Simulation, Context, RBAC |
93 | J. Hoffman |
Implementing RBAC on a Type Enforced System. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
type enforced system, security database implementations, RBAC mechanisms, LOCK6, RBAC features, firewall construction, lower level mechanism, type enforcement, Role Based Access Control, authorisation, application domain, application domains, secure operating system |
90 | Seiichi Kondo, Mizuho Iwaihara, Masatoshi Yoshikawa, Masashi Torato |
Extending RBAC for Large Enterprises and Its Quantitative Risk Evaluation. |
II3E |
2008 |
DBLP DOI BibTeX RDF |
|
90 | Chaoyi Pang, David P. Hansen, Anthony J. Maeder |
Managing RBAC states with transitive relations. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
graph theory, data integration, distributed database, role-based access control, redundant, directed acyclic graph (DAG) |
90 | Wei Zhou 0006, Christoph Meinel |
Team and Task Based RBAC Access Control Model. |
LANOMS |
2007 |
DBLP DOI BibTeX RDF |
|
90 | Yue Zhang 0002, James B. D. Joshi |
ARBAC07: A Role-based Administration Model for RBAC with Hybrid Hierarchy. |
IRI |
2007 |
DBLP DOI BibTeX RDF |
|
88 | Ramaswamy Chandramouli |
Application of XML tools for enterprise-wide RBAC implementation tasks. |
ACM Workshop on Role-Based Access Control |
2000 |
DBLP DOI BibTeX RDF |
XML |
82 | David F. Ferraiolo, Vijay Atluri |
A meta model for access control: why is it needed and is it even possible to achieve? |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
|
81 | Yue Zhang 0002, James B. D. Joshi |
SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
79 | Kai Ouyang, James B. D. Joshi |
CT-RBAC: A Temporal RBAC Model with Conditional Periodic Time. |
IPCCC |
2007 |
DBLP DOI BibTeX RDF |
|
79 | Jong Hyuk Park, Deok-Gyu Lee |
PIS-CC RBAC: Patient Information Service based on CC-RBAC in Next Generation Hospital considering Ubiquitous Intelligent Environment. |
MUE |
2007 |
DBLP DOI BibTeX RDF |
|
79 | Hong Zhang, Yeping He, Zhiguo Shi |
A formal model for access control with supporting spatial context. |
Sci. China Ser. F Inf. Sci. |
2007 |
DBLP DOI BibTeX RDF |
constraints, RBAC, information security, lattice, MLS, formal model, spatial context |
79 | Paolina Centonze, Gleb Naumovich, Stephen J. Fink, Marco Pistoia |
Role-Based access control consistency validation. |
ISSTA |
2006 |
DBLP DOI BibTeX RDF |
security, Java, static analysis, RBAC, role-based access control, J2EE, Java EE |
78 | Qi Xie, Dayou Liu, Haibo Yu 0002 |
Using Description Logic to Determine Seniority Among RB-RBAC Authorization Rules. |
RSKT |
2006 |
DBLP DOI BibTeX RDF |
RB-RBAC, attribute expression, seniority level, Description Logic, authorization rule |
72 | Chen Zhao 0001, NuerMaimaiti Heilili, Shengping Liu, Zuoquan Lin |
Representation and Reasoning on RBAC: A Description Logic Approach. |
ICTAC |
2005 |
DBLP DOI BibTeX RDF |
|
70 | Elisa Bertino, Barbara Catania, Maria Luisa Damiani, Paolo Perlasca |
GEO-RBAC: a spatially aware RBAC. |
SACMAT |
2005 |
DBLP DOI BibTeX RDF |
access control, GIS, location-based services, authorization model |
70 | Hassan Takabi, James B. D. Joshi |
StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy. |
SACMAT |
2010 |
DBLP DOI BibTeX RDF |
access control, similarity, role engineering, role mining, rbac |
70 | David F. Ferraiolo, John F. Barkley, D. Richard Kuhn |
A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet. |
ACM Trans. Inf. Syst. Secur. |
1999 |
DBLP DOI BibTeX RDF |
Web arrows, role based access, World Wide Web, access control, RBAC, authorization management |
70 | HyungHyo Lee, BongNam Noh |
An Integrity Enforcement Application Design and Operation Framework in Role-Based Access Control Systems: A Session-Oriented Approach. |
ICPP Workshops |
1999 |
DBLP DOI BibTeX RDF |
access control, integrity, RBAC, security model, separation of duty |
68 | Michael S. Kirkpatrick, Elisa Bertino |
Enforcing spatial constraints for mobile RBAC systems. |
SACMAT |
2010 |
DBLP DOI BibTeX RDF |
continuity of usage, location-based access control, RBAC |
68 | Yi Ren, Zhiting Xiao, Sipei Guo |
An Extended RBAC Model for Uniform Implementation of Role Hierarchy and Constraint. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
security, access control, RBAC |
68 | Mohammad Jafari, Mohammad Fathian |
Management Advantages of Object Classification in Role-Based Access Control (RBAC). |
ASIAN |
2007 |
DBLP DOI BibTeX RDF |
Access Control, Role-Based Access Control (RBAC), Object Classification |
68 | Chunyang Yuan, Yeping He, Jianbo He, Zhouyi Zhou |
A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
Verification, Formal Specification, RBAC, Separation of Duty |
68 | Diala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar |
An extended RBAC profile of XACML. |
SWS |
2006 |
DBLP DOI BibTeX RDF |
access control, RBAC, XACML, OrBAC |
68 | Yuqing Sun 0001, Peng Pan |
PRES: a practical flexible RBAC workflow system. |
ICEC |
2005 |
DBLP DOI BibTeX RDF |
property right exchange, workflow, RBAC, electronic business |
68 | Di Wu, Jian Lin, Yabo Dong, Miaoliang Zhu |
Using Semantic Web Technologies to Specify Constraints of RBAC. |
PDCAT |
2005 |
DBLP DOI BibTeX RDF |
Semantic Web, constraint, RBAC, OWL |
68 | Marc Wilikens, Simone Feriti, Alberto Sanna, Marcelo Masera |
A context-related authorization and access control method based on RBAC. |
SACMAT |
2002 |
DBLP DOI BibTeX RDF |
secure health care system, trust infrastructure, role based access control (RBAC) |
64 | Ali E. Abdallah, Etienne J. Khayat |
Formal Z Specifications of Several Flat Role-Based Access Control Models. |
SEW |
2006 |
DBLP DOI BibTeX RDF |
Authorization, Role-Based Access Control, Formal Models, Z specification |
64 | Dae-Kyoo Kim, Indrakshi Ray, Robert B. France, Na Li |
Modeling Role-Based Access Control Using Parameterized UML Models. |
FASE |
2004 |
DBLP DOI BibTeX RDF |
|
63 | Mingqiu Song, Zhiguo Pang |
Specification of SA-RBAC Policy Based on Colored Petri Net. |
Web Intelligence/IAT Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
63 | Yue Zhang 0002, James B. D. Joshi |
Temporal UAS: Supporting Efficient RBAC Authorization in Presence of the Temporal Role Hierarchy. |
EUC (2) |
2008 |
DBLP DOI BibTeX RDF |
|
63 | Qi Li 0002, Mingwei Xu, Xinwen Zhang |
Towards a Group-Based RBAC Model and Decentralized User-Role Administration. |
ICDCS Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
63 | Yahui Lu, Li Zhang 0065, Yinbo Liu, Jiaguang Sun 0001 |
Using pi-Calculus to Formalize Domain Administration of RBAC. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
63 | Aneta Poniszewska-Maranda |
Role engineering of information system using extended RBAC model. |
WETICE |
2005 |
DBLP DOI BibTeX RDF |
|
63 | Mark Strembeck, Gustaf Neumann |
An integrated approach to engineer and enforce context constraints in RBAC environments. |
ACM Trans. Inf. Syst. Secur. |
2004 |
DBLP DOI BibTeX RDF |
Context-dependent access control, constraints engineering, context constraints, role-based access control |
63 | Fredj Dridi, Björn Muschall, GĂ¼nther Pernul |
Administration of an RBAC System. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
|
63 | Gustaf Neumann, Mark Strembeck |
An approach to engineer and enforce context constraints in an RBAC environment. |
SACMAT |
2003 |
DBLP DOI BibTeX RDF |
|
63 | Zhen Xu, Dengguo Feng, Lan Li, Hua Chen 0011 |
UC-RBAC: A Usage Constrained Role-Based Access Control Model. |
ICICS |
2003 |
DBLP DOI BibTeX RDF |
|
61 | Maria Luisa Damiani, Elisa Bertino, Barbara Catania, Paolo Perlasca |
GEO-RBAC: A spatially aware RBAC. |
ACM Trans. Inf. Syst. Secur. |
2007 |
DBLP DOI BibTeX RDF |
GIS, location-based services, access-control model |
61 | Suroop Mohan Chandran, James B. D. Joshi |
LoT-RBAC: A Location and Time-Based RBAC Model. |
WISE |
2005 |
DBLP DOI BibTeX RDF |
location based access, role based access, temporal constraint |
61 | Maria Luisa Damiani, Elisa Bertino, Claudio Silvestri |
Spatial Domains for the Administration of Location-based Access Control Policies. |
J. Netw. Syst. Manag. |
2008 |
DBLP DOI BibTeX RDF |
Access control, Location-based services, RBAC, Spatial data |
61 | Liang Chen, Jason Crampton |
On spatio-temporal constraints and inheritance in role-based access control. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
ERBAC, spatio-temporal domain, RBAC |
61 | SeongKi Kim, EunKyung Jin, YoungJin Song, Sang-Yong Han |
Design and Implementation of Fast Access Control That Supports the Separation of Duty. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
Flask, Access control, RBAC, SELinux, DAC |
61 | Indrakshi Ray, Na Li, Robert B. France, Dae-Kyoo Kim |
Using uml to visualize role-based access control constraints. |
SACMAT |
2004 |
DBLP DOI BibTeX RDF |
modeling, UML, RBAC |
59 | Rodolfo Ferrini, Elisa Bertino |
Supporting RBAC with XACML+OWL. |
SACMAT |
2009 |
DBLP DOI BibTeX RDF |
OWL ontology, XACML, access control model, rbac |
59 | Ebru Celikel, Murat Kantarcioglu, Bhavani Thuraisingham, Elisa Bertino |
Managing Risks in RBAC Employed Distributed Environments. |
OTM Conferences (2) |
2007 |
DBLP DOI BibTeX RDF |
security, data mining, access control, RBAC, risk modeling |
59 | Lilong Han, Qingtang Liu, Zongkai Yang |
Authorization Constraints Specification of RBAC. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
RCL2000, DSOD, Constraints, RBAC, SOD |
59 | Mohammad A. Al-Kahtani, Ravi S. Sandhu |
Induced role hierarchies with attribute-based RBAC. |
SACMAT |
2003 |
DBLP DOI BibTeX RDF |
access control, RBAC, roles, attributes, roles hierarchies, authorization rules |
55 | Jeffrey Fischer, Daniel Marino, Rupak Majumdar, Todd D. Millstein |
Fine-Grained Access Control with Object-Sensitive Roles. |
ECOOP |
2009 |
DBLP DOI BibTeX RDF |
|
55 | Frithjof Dau, Martin Knechtel |
Access Policy Design Supported by FCA Methods. |
ICCS |
2009 |
DBLP DOI BibTeX RDF |
|
55 | Ninghui Li, Ziqing Mao |
Administration in role-based access control. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
|
55 | James Joshi, Rafae Bhatti, Elisa Bertino, Arif Ghafoor |
Access-Control Language for Multidomain Environments. |
IEEE Internet Comput. |
2004 |
DBLP DOI BibTeX RDF |
|
55 | HyungHyo Lee, Seungyong Lee 0001, BongNam Noh |
A New Role-Based Authorization Model in a Corporate Workflow Systems. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
55 | Mohammad A. Al-Kahtani, Ravi S. Sandhu |
Mohammad A. Al-Kahtani, Ravi Sandhu. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
55 | David F. Ferraiolo, Ramaswamy Chandramouli, Gail-Joon Ahn, Serban I. Gavrila |
The role control center: features and case studies. |
SACMAT |
2003 |
DBLP DOI BibTeX RDF |
administrative roles, role graph, separation of duty, role hierarchy, authorization management |
55 | Gregory Saunders, Michael Hitchens, Vijay Varadharajan |
Role-Based Access Control and the Access Control Matrix. |
ICICS |
2003 |
DBLP DOI BibTeX RDF |
|
54 | Klaus Rebensburg, Charles E. Youman, Vijay Atluri (eds.) |
Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000 |
RBAC |
2000 |
DBLP DOI BibTeX RDF |
|
54 | Charles E. Youman, Sylvia L. Osborn (eds.) |
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999 |
RBAC |
1999 |
DBLP DOI BibTeX RDF |
|
54 | Charles E. Youman, Trent Jaeger (eds.) |
Proceedings of the Third ACM Workshop on Role-Based Access Control, RBAC 1998, Fairfax, VA, USA, October 22-23, 1998 |
RBAC |
1998 |
DBLP DOI BibTeX RDF |
|
54 | Charles E. Youman, Edward J. Coyne, Trent Jaeger (eds.) |
Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997 |
RBAC |
1997 |
DBLP DOI BibTeX RDF |
|
54 | Charles E. Youman, Ravi S. Sandhu, Edward J. Coyne (eds.) |
Proceedings of the First ACM Workshop on Role-Based Access Control, RBAC 1995, Gaithersburg, MD, USA, November 30 - December 2, 1995 |
RBAC |
1995 |
DBLP DOI BibTeX RDF |
|
53 | Mikhail I. Gofman, Ruiqi Luo, Ayla C. Solomon, Yingbin Zhang, Ping Yang 0002, Scott D. Stoller |
RBAC-PAT: A Policy Analysis Tool for Role Based Access Control. |
TACAS |
2009 |
DBLP DOI BibTeX RDF |
|
53 | Candy Wai-Yue Shum, Sylvia L. Osborn, He Wang 0020 |
A Methodology for Bridging between RBAC and an Arbitrary Application Program. |
Secure Data Management |
2008 |
DBLP DOI BibTeX RDF |
|
53 | David W. Chadwick, Wensheng Xu, Sassa Otenko, Romain Laborde, Bassem Nasser |
Multi-session Separation of Duties (MSoD) for RBAC. |
ICDE Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Ruizhong Wei, K. Wu |
Exception Resolution Service for RBAC systems. |
CSCWD |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Deqing Zou, Jong Hyuk Park, Tai-Hoon Kim, Xueguang Chen |
Integrating Attribute and Status Constraint into the RBAC Model for Access Control in Ubiquitous Systems. |
FGCN (2) |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Joon S. Park, Keith P. Costello, Teresa M. Neven, Josh A. Diosomito |
A composite rbac approach for large, complex organizations. |
SACMAT |
2004 |
DBLP DOI BibTeX RDF |
role structures, role-based access control, role mappings |
53 | Jason Reid, Ian Cheong, Matthew Henricksen, Jason Smith 0001 |
A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
52 | Ravi S. Sandhu |
Engineering authority and trust in cyberspace: the OM-AM and RBAC way. |
ACM Workshop on Role-Based Access Control |
2000 |
DBLP DOI BibTeX RDF |
|
52 | Gail-Joon Ahn, Ravi S. Sandhu, Myong H. Kang, Joon S. Park |
Injecting RBAC to secure a Web-based workflow system. |
ACM Workshop on Role-Based Access Control |
2000 |
DBLP DOI BibTeX RDF |
|
52 | Trent Jaeger, Jonathon Tidswell |
Rebuttal to the NIST RBAC model proposal. |
ACM Workshop on Role-Based Access Control |
2000 |
DBLP DOI BibTeX RDF |
|
52 | Ian M. Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo 0001 |
Mining roles with semantic meanings. |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
RBAC, role engineering, role mining |
50 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde |
A formal framework to elicit roles with business meaning in RBAC systems. |
SACMAT |
2009 |
DBLP DOI BibTeX RDF |
business meaning, role-based access control, role engineering, role mining, rbac |
50 | Chao Huang, Jianling Sun, Xinyu Wang 0001, Yuanjie Si |
Selective Regression Test for Access Control System Employing RBAC. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
security, RBAC, regression test, test selection, policy verification |
50 | Maria Luisa Damiani, Claudio Silvestri, Elisa Bertino |
Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
hierarchical domains, access control, RBAC, administration, spatial information |
50 | Samrat Mondal, Shamik Sural |
A Verification Framework for Temporal RBAC with Role Hierarchy (Short Paper). |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
Temporal RBAC, Model Checking, Verification, Timed Automata, CTL |
50 | M. A. C. Dekker, Jason Crampton, Sandro Etalle |
RBAC administration in distributed systems. |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
distributed system, access control, RBAC, administration |
50 | Xiaogang Wang, Zhuoning Chen, Junxiang Tu |
Research of Integrated Access Control Based on Task-Driven RBAC for Lifecycle Software Quality Management. |
ICIRA (2) |
2008 |
DBLP DOI BibTeX RDF |
Task-driven role-based access control (T-RBAC), Software lifecycle management, Software Quality Management and Support Platform (SQMSP) |
50 | M. A. C. Dekker, J. G. Cederquist, Jason Crampton, Sandro Etalle |
Extended privilege inheritance in RBAC. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
administrative privileges, access control, RBAC |
50 | Basit Shafiq, James Joshi, Elisa Bertino, Arif Ghafoor |
Secure Interoperation in a Multidomain Environment Employing RBAC Policies. |
IEEE Trans. Knowl. Data Eng. |
2005 |
DBLP DOI BibTeX RDF |
policy integration, multidomain, Role-Based Access Control (RBAC), Secure interoperation |
50 | Jacques Wainer, Akhil Kumar 0001 |
A fine-grained, controllable, user-to-user delegation method in RBAC. |
SACMAT |
2005 |
DBLP DOI BibTeX RDF |
access control, RBAC, delegation, revocation |
50 | Axel Kern, Martin Kuhlmann, Rainer Kuropka, Andreas Ruthert |
A meta model for authorisations in application security systems and their integration into RBAC administration. |
SACMAT |
2004 |
DBLP DOI BibTeX RDF |
automated identity management, enterprise role-based access control (ERBAC), enterprise roles, sam jupiter, security provisioning, role-based access control (RBAC), application security, security administration |
46 | Subhendu Aich, Samrat Mondal, Shamik Sural, Arun K. Majumdar |
Role Based Access Control with Spatiotemporal Context for Mobile Applications. |
Trans. Comput. Sci. |
2009 |
DBLP DOI BibTeX RDF |
Spatiotemporal domain, Role extent, Permission extent, Spatiotemporal SOD and Telemedicine |
46 | Samrat Mondal, Shamik Sural |
XML-based policy specification framework for spatiotemporal access control. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
estarbac, permission extent, role extent, spatiotemporal policy specification, xml |
46 | Ninghui Li, Ji-Won Byun, Elisa Bertino |
A Critique of the ANSI Standard on Role-Based Access Control. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Hassan Takabi, Morteza Amini, Rasool Jalili |
Enhancing Role-Based Access Control Model through Fuzzy Relations. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Hassan Takabi, Morteza Amini, Rasool Jalili |
Separation of Duty in Role-Based Access Control Model through Fuzzy Relations. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Subhendu Aich, Shamik Sural, Arun K. Majumdar |
STARBAC: Spatio temporal Role Based Access C ontrol. |
OTM Conferences (2) |
2007 |
DBLP DOI BibTeX RDF |
STARBAC, spatiotemporal reference, role command, spatiotemporal satisfiability, Access control |
46 | Lilong Han, Qingtang Liu, Zongkai Yang |
Role-based Administration of User-role Assignment and Its Oracle Implementation. |
I3E (2) |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Raman Adaikkalavan, Sharma Chakravarthy |
How to Use Events and Rules for Supporting Role-Based Security? (Invited Paper). |
DEXA Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Raman Adaikkalavan, Sharma Chakravarthy |
Active Authorization Rules for Enforcing Role-Based Access Control and its Extensions. |
ICDE Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Hua Wang 0002, Jinli Cao, Yanchun Zhang |
A Consumer Scalable Anonymity Payment Scheme with Role-Based Access Control. |
WISE (1) |
2001 |
DBLP DOI BibTeX RDF |
Anonymity, Hash function, Traceability, Electronic-cash |
46 | Ravi S. Sandhu, Elisa Bertino, Trent Jaeger, D. Richard Kuhn, Carl E. Landwehr |
Panel: The next generation of acess control models (panel session): do we need them and what should they be? |
SACMAT |
2001 |
DBLP DOI BibTeX RDF |
|
46 | Michael E. Shin, Gail-Joon Ahn |
UML-Based Representation of Role-Based Access Control. |
WETICE |
2000 |
DBLP DOI BibTeX RDF |
|
46 | Ravi S. Sandhu |
Role Hierarchies and Constraints for Lattice-Based Access Controls. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1029 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|