|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 936 occurrences of 345 keywords
|
|
|
Results
Found 1029 publication records. Showing 1029 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
119 | Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta |
Security validation tool for business processes.  |
SACMAT  |
2011 |
DBLP DOI BibTeX RDF |
|
117 | Ravi S. Sandhu, David F. Ferraiolo, D. Richard Kuhn |
The NIST model for role-based access control: towards a unified standard.  |
ACM Workshop on Role-Based Access Control  |
2000 |
DBLP DOI BibTeX RDF |
|
110 | David F. Ferraiolo, Ravi S. Sandhu, Serban I. Gavrila, D. Richard Kuhn, Ramaswamy Chandramouli |
Proposed NIST standard for role-based access control.  |
ACM Trans. Inf. Syst. Secur.  |
2001 |
DBLP DOI BibTeX RDF |
security, access control, standards, Role-based access control, authorization management |
110 | Ravi S. Sandhu |
Future Directions in Role-Based Access Control Models.  |
MMM-ACNS  |
2001 |
DBLP DOI BibTeX RDF |
|
101 | Ali E. Abdallah, Etienne J. Khayat |
A Formal Model for Parameterized Role-Based Access Control.  |
Formal Aspects in Security and Trust  |
2004 |
DBLP DOI BibTeX RDF |
|
96 | Yong-Zhong He, Zhen Han, Ye Du |
Context Active RBAC and its Applications.  |
ISECS  |
2008 |
DBLP DOI BibTeX RDF |
Simulation, Context, RBAC |
93 | J. Hoffman |
Implementing RBAC on a Type Enforced System.  |
ACSAC  |
1997 |
DBLP DOI BibTeX RDF |
type enforced system, security database implementations, RBAC mechanisms, LOCK6, RBAC features, firewall construction, lower level mechanism, type enforcement, Role Based Access Control, authorisation, application domain, application domains, secure operating system |
90 | Seiichi Kondo, Mizuho Iwaihara, Masatoshi Yoshikawa, Masashi Torato |
Extending RBAC for Large Enterprises and Its Quantitative Risk Evaluation.  |
II3E  |
2008 |
DBLP DOI BibTeX RDF |
|
90 | Chaoyi Pang, David P. Hansen, Anthony J. Maeder |
Managing RBAC states with transitive relations.  |
AsiaCCS  |
2007 |
DBLP DOI BibTeX RDF |
graph theory, data integration, distributed database, role-based access control, redundant, directed acyclic graph (DAG) |
90 | Wei Zhou 0006, Christoph Meinel |
Team and Task Based RBAC Access Control Model.  |
LANOMS  |
2007 |
DBLP DOI BibTeX RDF |
|
90 | Yue Zhang 0002, James B. D. Joshi |
ARBAC07: A Role-based Administration Model for RBAC with Hybrid Hierarchy.  |
IRI  |
2007 |
DBLP DOI BibTeX RDF |
|
88 | Ramaswamy Chandramouli |
Application of XML tools for enterprise-wide RBAC implementation tasks.  |
ACM Workshop on Role-Based Access Control  |
2000 |
DBLP DOI BibTeX RDF |
XML |
82 | David F. Ferraiolo, Vijay Atluri |
A meta model for access control: why is it needed and is it even possible to achieve?  |
SACMAT  |
2008 |
DBLP DOI BibTeX RDF |
|
81 | Yue Zhang 0002, James B. D. Joshi |
SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy.  |
IAS  |
2007 |
DBLP DOI BibTeX RDF |
|
79 | Kai Ouyang, James B. D. Joshi |
CT-RBAC: A Temporal RBAC Model with Conditional Periodic Time.  |
IPCCC  |
2007 |
DBLP DOI BibTeX RDF |
|
79 | Jong Hyuk Park, Deok-Gyu Lee |
PIS-CC RBAC: Patient Information Service based on CC-RBAC in Next Generation Hospital considering Ubiquitous Intelligent Environment.  |
MUE  |
2007 |
DBLP DOI BibTeX RDF |
|
79 | Hong Zhang, Yeping He, Zhiguo Shi |
A formal model for access control with supporting spatial context.  |
Sci. China Ser. F Inf. Sci.  |
2007 |
DBLP DOI BibTeX RDF |
constraints, RBAC, information security, lattice, MLS, formal model, spatial context |
79 | Paolina Centonze, Gleb Naumovich, Stephen J. Fink, Marco Pistoia |
Role-Based access control consistency validation.  |
ISSTA  |
2006 |
DBLP DOI BibTeX RDF |
security, Java, static analysis, RBAC, role-based access control, J2EE, Java EE |
78 | Qi Xie, Dayou Liu, Haibo Yu 0002 |
Using Description Logic to Determine Seniority Among RB-RBAC Authorization Rules.  |
RSKT  |
2006 |
DBLP DOI BibTeX RDF |
RB-RBAC, attribute expression, seniority level, Description Logic, authorization rule |
72 | Chen Zhao 0001, NuerMaimaiti Heilili, Shengping Liu, Zuoquan Lin |
Representation and Reasoning on RBAC: A Description Logic Approach.  |
ICTAC  |
2005 |
DBLP DOI BibTeX RDF |
|
70 | Elisa Bertino, Barbara Catania, Maria Luisa Damiani, Paolo Perlasca |
GEO-RBAC: a spatially aware RBAC.  |
SACMAT  |
2005 |
DBLP DOI BibTeX RDF |
access control, GIS, location-based services, authorization model |
70 | Hassan Takabi, James B. D. Joshi |
StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy.  |
SACMAT  |
2010 |
DBLP DOI BibTeX RDF |
access control, similarity, role engineering, role mining, rbac |
70 | David F. Ferraiolo, John F. Barkley, D. Richard Kuhn |
A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet.  |
ACM Trans. Inf. Syst. Secur.  |
1999 |
DBLP DOI BibTeX RDF |
Web arrows, role based access, World Wide Web, access control, RBAC, authorization management |
70 | HyungHyo Lee, BongNam Noh |
An Integrity Enforcement Application Design and Operation Framework in Role-Based Access Control Systems: A Session-Oriented Approach.  |
ICPP Workshops  |
1999 |
DBLP DOI BibTeX RDF |
access control, integrity, RBAC, security model, separation of duty |
68 | Michael S. Kirkpatrick, Elisa Bertino |
Enforcing spatial constraints for mobile RBAC systems.  |
SACMAT  |
2010 |
DBLP DOI BibTeX RDF |
continuity of usage, location-based access control, RBAC |
68 | Yi Ren, Zhiting Xiao, Sipei Guo |
An Extended RBAC Model for Uniform Implementation of Role Hierarchy and Constraint.  |
ISECS  |
2008 |
DBLP DOI BibTeX RDF |
security, access control, RBAC |
68 | Mohammad Jafari, Mohammad Fathian |
Management Advantages of Object Classification in Role-Based Access Control (RBAC).  |
ASIAN  |
2007 |
DBLP DOI BibTeX RDF |
Access Control, Role-Based Access Control (RBAC), Object Classification |
68 | Chunyang Yuan, Yeping He, Jianbo He, Zhouyi Zhou |
A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty.  |
Inscrypt  |
2006 |
DBLP DOI BibTeX RDF |
Verification, Formal Specification, RBAC, Separation of Duty |
68 | Diala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar |
An extended RBAC profile of XACML.  |
SWS  |
2006 |
DBLP DOI BibTeX RDF |
access control, RBAC, XACML, OrBAC |
68 | Yuqing Sun 0001, Peng Pan |
PRES: a practical flexible RBAC workflow system.  |
ICEC  |
2005 |
DBLP DOI BibTeX RDF |
property right exchange, workflow, RBAC, electronic business |
68 | Di Wu, Jian Lin, Yabo Dong, Miaoliang Zhu |
Using Semantic Web Technologies to Specify Constraints of RBAC.  |
PDCAT  |
2005 |
DBLP DOI BibTeX RDF |
Semantic Web, constraint, RBAC, OWL |
68 | Marc Wilikens, Simone Feriti, Alberto Sanna, Marcelo Masera |
A context-related authorization and access control method based on RBAC.  |
SACMAT  |
2002 |
DBLP DOI BibTeX RDF |
secure health care system, trust infrastructure, role based access control (RBAC) |
64 | Ali E. Abdallah, Etienne J. Khayat |
Formal Z Specifications of Several Flat Role-Based Access Control Models.  |
SEW  |
2006 |
DBLP DOI BibTeX RDF |
Authorization, Role-Based Access Control, Formal Models, Z specification |
64 | Dae-Kyoo Kim, Indrakshi Ray, Robert B. France, Na Li |
Modeling Role-Based Access Control Using Parameterized UML Models.  |
FASE  |
2004 |
DBLP DOI BibTeX RDF |
|
63 | Mingqiu Song, Zhiguo Pang |
Specification of SA-RBAC Policy Based on Colored Petri Net.  |
Web Intelligence/IAT Workshops  |
2008 |
DBLP DOI BibTeX RDF |
|
63 | Yue Zhang 0002, James B. D. Joshi |
Temporal UAS: Supporting Efficient RBAC Authorization in Presence of the Temporal Role Hierarchy.  |
EUC (2)  |
2008 |
DBLP DOI BibTeX RDF |
|
63 | Qi Li 0002, Mingwei Xu, Xinwen Zhang |
Towards a Group-Based RBAC Model and Decentralized User-Role Administration.  |
ICDCS Workshops  |
2008 |
DBLP DOI BibTeX RDF |
|
63 | Yahui Lu, Li Zhang 0065, Yinbo Liu, Jiaguang Sun 0001 |
Using pi-Calculus to Formalize Domain Administration of RBAC.  |
ISPEC  |
2006 |
DBLP DOI BibTeX RDF |
|
63 | Aneta Poniszewska-Maranda |
Role engineering of information system using extended RBAC model.  |
WETICE  |
2005 |
DBLP DOI BibTeX RDF |
|
63 | Mark Strembeck, Gustaf Neumann |
An integrated approach to engineer and enforce context constraints in RBAC environments.  |
ACM Trans. Inf. Syst. Secur.  |
2004 |
DBLP DOI BibTeX RDF |
Context-dependent access control, constraints engineering, context constraints, role-based access control |
63 | Fredj Dridi, Björn Muschall, GĂ¼nther Pernul |
Administration of an RBAC System.  |
HICSS  |
2004 |
DBLP DOI BibTeX RDF |
|
63 | Gustaf Neumann, Mark Strembeck |
An approach to engineer and enforce context constraints in an RBAC environment.  |
SACMAT  |
2003 |
DBLP DOI BibTeX RDF |
|
63 | Zhen Xu, Dengguo Feng, Lan Li, Hua Chen 0011 |
UC-RBAC: A Usage Constrained Role-Based Access Control Model.  |
ICICS  |
2003 |
DBLP DOI BibTeX RDF |
|
61 | Maria Luisa Damiani, Elisa Bertino, Barbara Catania, Paolo Perlasca |
GEO-RBAC: A spatially aware RBAC.  |
ACM Trans. Inf. Syst. Secur.  |
2007 |
DBLP DOI BibTeX RDF |
GIS, location-based services, access-control model |
61 | Suroop Mohan Chandran, James B. D. Joshi |
LoT-RBAC: A Location and Time-Based RBAC Model.  |
WISE  |
2005 |
DBLP DOI BibTeX RDF |
location based access, role based access, temporal constraint |
61 | Maria Luisa Damiani, Elisa Bertino, Claudio Silvestri |
Spatial Domains for the Administration of Location-based Access Control Policies.  |
J. Netw. Syst. Manag.  |
2008 |
DBLP DOI BibTeX RDF |
Access control, Location-based services, RBAC, Spatial data |
61 | Liang Chen, Jason Crampton |
On spatio-temporal constraints and inheritance in role-based access control.  |
AsiaCCS  |
2008 |
DBLP DOI BibTeX RDF |
ERBAC, spatio-temporal domain, RBAC |
61 | SeongKi Kim, EunKyung Jin, YoungJin Song, Sang-Yong Han |
Design and Implementation of Fast Access Control That Supports the Separation of Duty.  |
Inscrypt  |
2006 |
DBLP DOI BibTeX RDF |
Flask, Access control, RBAC, SELinux, DAC |
61 | Indrakshi Ray, Na Li, Robert B. France, Dae-Kyoo Kim |
Using uml to visualize role-based access control constraints.  |
SACMAT  |
2004 |
DBLP DOI BibTeX RDF |
modeling, UML, RBAC |
59 | Rodolfo Ferrini, Elisa Bertino |
Supporting RBAC with XACML+OWL.  |
SACMAT  |
2009 |
DBLP DOI BibTeX RDF |
OWL ontology, XACML, access control model, rbac |
59 | Ebru Celikel, Murat Kantarcioglu, Bhavani Thuraisingham, Elisa Bertino |
Managing Risks in RBAC Employed Distributed Environments.  |
OTM Conferences (2)  |
2007 |
DBLP DOI BibTeX RDF |
security, data mining, access control, RBAC, risk modeling |
59 | Lilong Han, Qingtang Liu, Zongkai Yang |
Authorization Constraints Specification of RBAC.  |
WISA  |
2007 |
DBLP DOI BibTeX RDF |
RCL2000, DSOD, Constraints, RBAC, SOD |
59 | Mohammad A. Al-Kahtani, Ravi S. Sandhu |
Induced role hierarchies with attribute-based RBAC.  |
SACMAT  |
2003 |
DBLP DOI BibTeX RDF |
access control, RBAC, roles, attributes, roles hierarchies, authorization rules |
55 | Jeffrey Fischer, Daniel Marino, Rupak Majumdar, Todd D. Millstein |
Fine-Grained Access Control with Object-Sensitive Roles.  |
ECOOP  |
2009 |
DBLP DOI BibTeX RDF |
|
55 | Frithjof Dau, Martin Knechtel |
Access Policy Design Supported by FCA Methods.  |
ICCS  |
2009 |
DBLP DOI BibTeX RDF |
|
55 | Ninghui Li, Ziqing Mao |
Administration in role-based access control.  |
AsiaCCS  |
2007 |
DBLP DOI BibTeX RDF |
|
55 | James Joshi, Rafae Bhatti, Elisa Bertino, Arif Ghafoor |
Access-Control Language for Multidomain Environments.  |
IEEE Internet Comput.  |
2004 |
DBLP DOI BibTeX RDF |
|
55 | HyungHyo Lee, Seungyong Lee 0001, BongNam Noh |
A New Role-Based Authorization Model in a Corporate Workflow Systems.  |
ICCSA (1)  |
2004 |
DBLP DOI BibTeX RDF |
|
55 | Mohammad A. Al-Kahtani, Ravi S. Sandhu |
Mohammad A. Al-Kahtani, Ravi Sandhu.  |
ACSAC  |
2004 |
DBLP DOI BibTeX RDF |
|
55 | David F. Ferraiolo, Ramaswamy Chandramouli, Gail-Joon Ahn, Serban I. Gavrila |
The role control center: features and case studies.  |
SACMAT  |
2003 |
DBLP DOI BibTeX RDF |
administrative roles, role graph, separation of duty, role hierarchy, authorization management |
55 | Gregory Saunders, Michael Hitchens, Vijay Varadharajan |
Role-Based Access Control and the Access Control Matrix.  |
ICICS  |
2003 |
DBLP DOI BibTeX RDF |
|
54 | Klaus Rebensburg, Charles E. Youman, Vijay Atluri (eds.) |
Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000  |
RBAC  |
2000 |
DBLP DOI BibTeX RDF |
|
54 | Charles E. Youman, Sylvia L. Osborn (eds.) |
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999  |
RBAC  |
1999 |
DBLP DOI BibTeX RDF |
|
54 | Charles E. Youman, Trent Jaeger (eds.) |
Proceedings of the Third ACM Workshop on Role-Based Access Control, RBAC 1998, Fairfax, VA, USA, October 22-23, 1998  |
RBAC  |
1998 |
DBLP DOI BibTeX RDF |
|
54 | Charles E. Youman, Edward J. Coyne, Trent Jaeger (eds.) |
Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997  |
RBAC  |
1997 |
DBLP DOI BibTeX RDF |
|
54 | Charles E. Youman, Ravi S. Sandhu, Edward J. Coyne (eds.) |
Proceedings of the First ACM Workshop on Role-Based Access Control, RBAC 1995, Gaithersburg, MD, USA, November 30 - December 2, 1995  |
RBAC  |
1995 |
DBLP DOI BibTeX RDF |
|
53 | Mikhail I. Gofman, Ruiqi Luo, Ayla C. Solomon, Yingbin Zhang, Ping Yang 0002, Scott D. Stoller |
RBAC-PAT: A Policy Analysis Tool for Role Based Access Control.  |
TACAS  |
2009 |
DBLP DOI BibTeX RDF |
|
53 | Candy Wai-Yue Shum, Sylvia L. Osborn, He Wang 0020 |
A Methodology for Bridging between RBAC and an Arbitrary Application Program.  |
Secure Data Management  |
2008 |
DBLP DOI BibTeX RDF |
|
53 | David W. Chadwick, Wensheng Xu, Sassa Otenko, Romain Laborde, Bassem Nasser |
Multi-session Separation of Duties (MSoD) for RBAC.  |
ICDE Workshops  |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Ruizhong Wei, K. Wu |
Exception Resolution Service for RBAC systems.  |
CSCWD  |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Deqing Zou, Jong Hyuk Park, Tai-Hoon Kim, Xueguang Chen |
Integrating Attribute and Status Constraint into the RBAC Model for Access Control in Ubiquitous Systems.  |
FGCN (2)  |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Joon S. Park, Keith P. Costello, Teresa M. Neven, Josh A. Diosomito |
A composite rbac approach for large, complex organizations.  |
SACMAT  |
2004 |
DBLP DOI BibTeX RDF |
role structures, role-based access control, role mappings |
53 | Jason Reid, Ian Cheong, Matthew Henricksen, Jason Smith 0001 |
A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems.  |
ACISP  |
2003 |
DBLP DOI BibTeX RDF |
|
52 | Ravi S. Sandhu |
Engineering authority and trust in cyberspace: the OM-AM and RBAC way.  |
ACM Workshop on Role-Based Access Control  |
2000 |
DBLP DOI BibTeX RDF |
|
52 | Gail-Joon Ahn, Ravi S. Sandhu, Myong H. Kang, Joon S. Park |
Injecting RBAC to secure a Web-based workflow system.  |
ACM Workshop on Role-Based Access Control  |
2000 |
DBLP DOI BibTeX RDF |
|
52 | Trent Jaeger, Jonathon Tidswell |
Rebuttal to the NIST RBAC model proposal.  |
ACM Workshop on Role-Based Access Control  |
2000 |
DBLP DOI BibTeX RDF |
|
52 | Ian M. Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo 0001 |
Mining roles with semantic meanings.  |
SACMAT  |
2008 |
DBLP DOI BibTeX RDF |
RBAC, role engineering, role mining |
50 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde |
A formal framework to elicit roles with business meaning in RBAC systems.  |
SACMAT  |
2009 |
DBLP DOI BibTeX RDF |
business meaning, role-based access control, role engineering, role mining, rbac |
50 | Chao Huang, Jianling Sun, Xinyu Wang 0001, Yuanjie Si |
Selective Regression Test for Access Control System Employing RBAC.  |
ISA  |
2009 |
DBLP DOI BibTeX RDF |
security, RBAC, regression test, test selection, policy verification |
50 | Maria Luisa Damiani, Claudio Silvestri, Elisa Bertino |
Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems.  |
ARES  |
2008 |
DBLP DOI BibTeX RDF |
hierarchical domains, access control, RBAC, administration, spatial information |
50 | Samrat Mondal, Shamik Sural |
A Verification Framework for Temporal RBAC with Role Hierarchy (Short Paper).  |
ICISS  |
2008 |
DBLP DOI BibTeX RDF |
Temporal RBAC, Model Checking, Verification, Timed Automata, CTL |
50 | M. A. C. Dekker, Jason Crampton, Sandro Etalle |
RBAC administration in distributed systems.  |
SACMAT  |
2008 |
DBLP DOI BibTeX RDF |
distributed system, access control, RBAC, administration |
50 | Xiaogang Wang, Zhuoning Chen, Junxiang Tu |
Research of Integrated Access Control Based on Task-Driven RBAC for Lifecycle Software Quality Management.  |
ICIRA (2)  |
2008 |
DBLP DOI BibTeX RDF |
Task-driven role-based access control (T-RBAC), Software lifecycle management, Software Quality Management and Support Platform (SQMSP) |
50 | M. A. C. Dekker, J. G. Cederquist, Jason Crampton, Sandro Etalle |
Extended privilege inheritance in RBAC.  |
AsiaCCS  |
2007 |
DBLP DOI BibTeX RDF |
administrative privileges, access control, RBAC |
50 | Basit Shafiq, James Joshi, Elisa Bertino, Arif Ghafoor |
Secure Interoperation in a Multidomain Environment Employing RBAC Policies.  |
IEEE Trans. Knowl. Data Eng.  |
2005 |
DBLP DOI BibTeX RDF |
policy integration, multidomain, Role-Based Access Control (RBAC), Secure interoperation |
50 | Jacques Wainer, Akhil Kumar 0001 |
A fine-grained, controllable, user-to-user delegation method in RBAC.  |
SACMAT  |
2005 |
DBLP DOI BibTeX RDF |
access control, RBAC, delegation, revocation |
50 | Axel Kern, Martin Kuhlmann, Rainer Kuropka, Andreas Ruthert |
A meta model for authorisations in application security systems and their integration into RBAC administration.  |
SACMAT  |
2004 |
DBLP DOI BibTeX RDF |
automated identity management, enterprise role-based access control (ERBAC), enterprise roles, sam jupiter, security provisioning, role-based access control (RBAC), application security, security administration |
46 | Subhendu Aich, Samrat Mondal, Shamik Sural, Arun K. Majumdar |
Role Based Access Control with Spatiotemporal Context for Mobile Applications.  |
Trans. Comput. Sci.  |
2009 |
DBLP DOI BibTeX RDF |
Spatiotemporal domain, Role extent, Permission extent, Spatiotemporal SOD and Telemedicine |
46 | Samrat Mondal, Shamik Sural |
XML-based policy specification framework for spatiotemporal access control.  |
SIN  |
2009 |
DBLP DOI BibTeX RDF |
estarbac, permission extent, role extent, spatiotemporal policy specification, xml |
46 | Ninghui Li, Ji-Won Byun, Elisa Bertino |
A Critique of the ANSI Standard on Role-Based Access Control.  |
IEEE Secur. Priv.  |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Hassan Takabi, Morteza Amini, Rasool Jalili |
Enhancing Role-Based Access Control Model through Fuzzy Relations.  |
IAS  |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Hassan Takabi, Morteza Amini, Rasool Jalili |
Separation of Duty in Role-Based Access Control Model through Fuzzy Relations.  |
IAS  |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Subhendu Aich, Shamik Sural, Arun K. Majumdar |
STARBAC: Spatio temporal Role Based Access C ontrol.  |
OTM Conferences (2)  |
2007 |
DBLP DOI BibTeX RDF |
STARBAC, spatiotemporal reference, role command, spatiotemporal satisfiability, Access control |
46 | Lilong Han, Qingtang Liu, Zongkai Yang |
Role-based Administration of User-role Assignment and Its Oracle Implementation.  |
I3E (2)  |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Raman Adaikkalavan, Sharma Chakravarthy |
How to Use Events and Rules for Supporting Role-Based Security? (Invited Paper).  |
DEXA Workshops  |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Raman Adaikkalavan, Sharma Chakravarthy |
Active Authorization Rules for Enforcing Role-Based Access Control and its Extensions.  |
ICDE Workshops  |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Hua Wang 0002, Jinli Cao, Yanchun Zhang |
A Consumer Scalable Anonymity Payment Scheme with Role-Based Access Control.  |
WISE (1)  |
2001 |
DBLP DOI BibTeX RDF |
Anonymity, Hash function, Traceability, Electronic-cash |
46 | Ravi S. Sandhu, Elisa Bertino, Trent Jaeger, D. Richard Kuhn, Carl E. Landwehr |
Panel: The next generation of acess control models (panel session): do we need them and what should they be?  |
SACMAT  |
2001 |
DBLP DOI BibTeX RDF |
|
46 | Michael E. Shin, Gail-Joon Ahn |
UML-Based Representation of Role-Based Access Control.  |
WETICE  |
2000 |
DBLP DOI BibTeX RDF |
|
46 | Ravi S. Sandhu |
Role Hierarchies and Constraints for Lattice-Based Access Controls.  |
ESORICS  |
1996 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1029 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|