|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 20325 occurrences of 7772 keywords
|
|
|
Results
Found 44187 publication records. Showing 44182 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
140 | Luong T. Nguyen, Liping Zhao 0001, Bill Appelbe |
A Set Approach to Role Modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TOOLS (37) ![In: TOOLS Pacific 2000: 37th International Conference on Technology of Object-Oriented Languages and Systems, Sydney, Australia, November 2000, pp. 158-169, 2000, IEEE Computer Society, 0-7695-0918-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
set approach, role modeling techniques, role description, role binding, role constraints, set inclusion, role specialisation, role compositions, part role, set notation, dynamic description, class/role relationships, class/role structures, Object-Z-like notation, system obligations, Petri net transitions, objects/role instances, system operations, formal specification, formal method, Petri nets, object-oriented programming, object-oriented methods, set theory, EMS, graphic notations, dynamic aspects, set operations, set intersection, formal notation, set union, set unions, set difference |
82 | Takeo Hamada |
Role-based Access Control in Telecommunication Service Management - Dynamic Role Creation and Management in TINA Service Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Third ACM Workshop on Role-Based Access Control, RBAC 1998, Fairfax, VA, USA, October 22-23, 1998, pp. 105-113, 1998, ACM, 1-58113-113-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
role algebra, role class hierarchy, security space, strongly-roled system, telecommunication service management, role-based access control, TINA, role mapping |
80 | Jürgen Schlegelmilch, Ulrike Steffens |
Role mining with ORCA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings, pp. 168-176, 2005, ACM, 1-59593-045-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
role definition, data mining, role-based access control, cluster analysis, role engineering, role mining, role hierarchy |
62 | Dana Zhang, Kotagiri Ramamohanarao, Tim Ebringer |
Role engineering using graph optimisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 139-144, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
graph optimisation, role definition, role-based access control, role engineering, role hierarchy |
62 | Haio Roeckle, Gerhard Schimpf, Rupert Weidinger |
Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000, pp. 103-110, 2000, ACM, 1-58113-259-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
enterprise process modeling, security data models, single point of administration and control, access control, authorizations, role based access control, business processes, heterogeneous systems, security models, security management, security administration |
62 | Vugranam C. Sreedhar |
Data-centric security: role analysis and role typestates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings, pp. 170-179, 2006, ACM, 1-59593-353-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
role analysis, role escape analysis, role typestates, RBAC |
61 | SangYeob Na, SuhHyun Cheon |
Role delegation in role-based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000, pp. 39-44, 2000, ACM, 1-58113-259-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
active delegation, delegation protocol, delegation server, passive delegation, role delegation, role-based access control |
61 | Emil Lupu, Morris Sloman |
Reconciling role based management and role based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 135-141, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
role object model, RBAC, role engineering, distributed systems management |
60 | Matunda Nyanchama, Sylvia L. Osborn |
The Role Graph Model and Conflict of Interest. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 2(1), pp. 3-33, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
role graphs, role-based security, conflict of interest |
55 | Pete Epstein, Ravi S. Sandhu |
Towards a UML Based Approach to Role Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999, pp. 135-143, 1999, ACM, 1-58113-180-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Lilac, UML, unified modeling language, RBAC, role based access control, role engineering |
55 | Raymond K. Wong 0001 |
RBAC support in object-oriented role databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 109-120, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
object-oriented role database, role-based access control, database security |
52 | Jason Crampton, George Loizou |
Administrative scope: A foundation for role-based administrative models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 6(2), pp. 201-231, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
administrative scope, encapsulated range, role hierarchy operation, role-based administration, Role-based access control |
52 | Axel Kern, Andreas Schaad, Jonathan D. Moffett |
An administration concept for the enterprise role-based access control model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 3-11, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
SAM Jupiter, administrative role-based access control (ARBAC), automated identity management, enterprise role-based access control (ERBAC), enterprise roles, security provisioning, role-based access control (RBAC), scopes, security administration |
51 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde |
A formal framework to elicit roles with business meaning in RBAC systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009, Proceedings, pp. 85-94, 2009, ACM, 978-1-60558-537-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
business meaning, role-based access control, role engineering, role mining, rbac |
51 | K. Chandra Sekharaiah, D. Janaki Ram |
Object Schizophrenia Problem in Object Role System Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOIS ![In: Object-Oriented. Information Systems, 8th International Conference, OOIS 2002, Montpellier, France, September 2-5, 2002, Proceedings, pp. 494-506, 2002, Springer, 3-540-44087-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Object Schizophrenia (OS), Object Schizophrenia Problem (OSP), Role Modeling Problem (RMP), Subject Oriented Programming (SOP), Whole-Part Association (WPA), Role Paradigm Conformance Model (RPCM) |
51 | Serban I. Gavrila, John F. Barkley |
Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Third ACM Workshop on Role-Based Access Control, RBAC 1998, Fairfax, VA, USA, October 22-23, 1998, pp. 81-90, 1998, ACM, 1-58113-113-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
49 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello |
A cost-driven approach to role engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 2129-2136, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data mining, role-based access control, role engineering, role mining, cost optimization |
48 | Vijay Atluri |
Panel on role engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings, pp. 61-62, 2008, ACM, 978-1-60558-129-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
RBAC, role engineering, role mining |
48 | Gry Seland |
Empowering End Users in Design of Mobile Technology Using Role Play as a Method: Reflections on the Role-Play Conduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (10) ![In: Human Centered Design, First International Conference, HCD 2009, Held as Part of HCI International 2009, San Diego, CA, USA, July 19-24, 2009, Proceedings, pp. 912-921, 2009, Springer, 978-3-642-02805-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Role play, user involvement |
47 | Axel Kern, Martin Kuhlmann, Andreas Schaad, Jonathan D. Moffett |
Observations on the role life-cycle in the context of enterprise security management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 43-51, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
enterprise security management (ESM), enterprise user administration (EUA), role life-cycle, role management, security administration manager (SAM), process model, role engineering, distributed system management, security administration |
46 | Joon S. Park, Keith P. Costello, Teresa M. Neven, Josh A. Diosomito |
A composite rbac approach for large, complex organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 163-172, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
role structures, role-based access control, role mappings |
46 | James Joshi, Elisa Bertino, Usman Latif, Arif Ghafoor |
A Generalized Temporal Role-Based Access Control Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 17(1), pp. 4-23, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Access control, temporal constraints, separation of duty, role-based, role hierarchy |
45 | Noa Tuval, Ehud Gudes |
Resolving Information Flow Conflicts in RBAC Systems. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings, pp. 148-162, 2006, Springer, 3-540-36796-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
role graph consistency, canonical groups, Role based access control |
45 | Kami Brooks |
Migrating to Role-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999, pp. 71-81, 1999, ACM, 1-58113-180-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Tivoli Management Environment, enterprise systems management, role-based access control, migration, security management |
45 | Cheh Goh, Adrian Baldwin |
Towards a More Complete Model of Role. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Third ACM Workshop on Role-Based Access Control, RBAC 1998, Fairfax, VA, USA, October 22-23, 1998, pp. 55-62, 1998, ACM, 1-58113-113-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
constraint-based, access control, management, RBAC, role-based |
45 | E. B. Fernandez, J. C. Hawkins |
Determining role rights from use cases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 121-125, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
object-oriented authorization, role-based-access-control, use cases, object-oriented analysis, authorization models |
45 | Nicholas Yialelis, Emil Lupu, Morris Sloman |
Role-based security for distributed object systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 5th Workshop on Enabling Technologies, Infrastructure for Collaborative Enterprises (WET-ICE'96), June 19-21, 1996, Stanford, CA, USA, Proceedings, pp. 80-85, 1996, IEEE Computer Society, 0-8186-7445-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
role based security, multi organisational enterprise, role framework, obligation policies, domain based authentication service, replicated servers, minimal state, access control, distributed processing, role based access control, security policies, authorisation, security architecture, distributed object systems, access rights, symmetric cryptography, security agents |
44 | Richard W. C. Lui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Role Activation Management in Role Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings, pp. 358-369, 2005, Springer, 3-540-26547-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Role Activation, Dynamic Separation of Duty, Role Based Access Control, Security Management |
44 | James B. D. Joshi, Elisa Bertino, Arif Ghafoor, Yue Zhang 0002 |
Formal foundations for hybrid hierarchies in GTRBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 10(4), pp. 2:1-2:39, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Derived relation, Role hierarchy |
44 | Mario Frank 0001, Joachim M. Buhmann, David A. Basin |
On the definition of role mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings, pp. 35-44, 2010, ACM, 978-1-4503-0049-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
RBAC, role engineering, role mining |
44 | Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Secure Role Activation and Authorization in the Enterprise Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 22-35, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Role Activation, Role Based Access Control, Proxy Signature, Digital Credential |
42 | Yan Zhu 0010, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang |
Cryptographic role-based security mechanisms based on role-key hierarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 314-319, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
role-based cryptosystem, role-key hierarchy, access control, pairing-based cryptosystem |
41 | Ludwig Fuchs, Günther Pernul |
HyDRo - Hybrid Development of Roles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings, pp. 287-302, 2008, Springer, 978-3-540-89861-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Role Development Methodology, Information security, Identity Management, Role Engineering, Role Mining |
41 | Ian M. Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao, Qihua Wang, Jorge Lobo 0001 |
Evaluating role mining algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009, Proceedings, pp. 95-104, 2009, ACM, 978-1-60558-537-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
evaluation, role engineering, role mining, rbac |
41 | Sejong Oh, Ravi S. Sandhu, Xinwen Zhang |
An effective role administration model using organization structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 9(2), pp. 113-137, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
role administration, Access control, RBAC, role-based access control |
40 | Shaomin Zhang, Xiangjun Kong, Baoyi Wang |
Study on Role-Spliting and Its Ontology-Based Evaluation Methods during Role Mapping of Inter-domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 642-645, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Haio Roeckle |
Role-finding/role-engineering (panel session). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000, pp. 68, 2000, ACM, 1-58113-259-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
UML |
40 | Siqing Du, James B. D. Joshi |
Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings, pp. 228-236, 2006, ACM, 1-59593-353-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
multidomain, role based access control, hierarchy, secure interoperation, role mapping |
39 | Thomas Gebhardt, Thomas Hildmann 0001 |
Enabling technologies for role based online decision engines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000, pp. 77-82, 2000, ACM, 1-58113-259-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
39 | Sylvia L. Osborn, Yuxia Guo |
Modeling users in role-based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000, pp. 31-37, 2000, ACM, 1-58113-259-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
39 | Elisa Bertino, Piero A. Bonatti, Elena Ferrari |
TRBAC: a temporal role-based access control model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000, pp. 21-30, 2000, ACM, 1-58113-259-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
39 | Jinwei Hu, Yan Zhang 0003, Ruixuan Li 0001, Zhengding Lu |
Role updating for assignments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings, pp. 89-98, 2010, ACM, 978-1-4503-0049-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
role updating, model checking, role engineering, rbac |
39 | Mario Frank 0001, Andreas P. Streich, David A. Basin, Joachim M. Buhmann |
A probabilistic approach to hybrid role mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 101-111, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
business meaning, hybrid role mining, machine learning, role mining, rbac |
39 | Kanliang Wang, Qin Shu |
The Moderating Impact of Perceived Organizational Support on the Relationship between Technostress and Role Stress. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 1-5 September 2008, Turin, Italy, pp. 420-424, 2008, IEEE Computer Society, 978-0-7695-3299-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
perceived organizational support, Technostress, role conflict, role overload |
39 | Ying Liu, Jean Bacon |
A Practical Synthesis of Dynamic Role Settings in Telecare Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDS ![In: First International Conference on the Digital Society (ICDS 2007), 2-6 January 2007, Guadeloupe, French Caribbean, pp. 5, 2007, IEEE Computer Society, 978-0-7695-2760-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Role Provisioning, Dynamic Trust, Role Context, Dynamic Access, RBAC, e-Service, Telecare, Meta-synthesis |
39 | Jun-Cheol Jeon, Kee-Young Yoo |
Cellular Automata Based Role-Delegation in RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACRI ![In: Cellular Automata, 7th International Conference on Cellular Automata, for Research and Industry, ACRI 2006, Perpignan, France, September 20-23, 2006, Proceedings, pp. 588-594, 2006, Springer, 3-540-40929-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Multiple-Attractor Cellular Automata, Role-Delegation, Role-based Access Control, Separation of Duty |
39 | James Joshi, Elisa Bertino, Arif Ghafoor |
Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 26th International Computer Software and Applications Conference (COMPSAC 2002), Prolonging Software Life: Development and Redevelopment, 26-29 August 2002, Oxford, England, Proceedings, pp. 951-956, 2002, IEEE Computer Society, 0-7695-1727-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
temporal hierarchy, access control, role based |
38 | Gail-Joon Ahn, Ravi S. Sandhu, Myong H. Kang, Joon S. Park |
Injecting RBAC to secure a Web-based workflow system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000, pp. 1-10, 2000, ACM, 1-58113-259-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
38 | Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warner |
RoleMiner: mining roles using subset enumeration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 144-153, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
RBAC, role engineering, role mining |
38 | Zude Li, Guoqiang Zhan, Xiaojun Ye |
Role-Based Peer-to-Peer Model: Capture Global Pseudonymity for Privacy Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIM ![In: Advances in Web-Age Information Management, 7th International Conference,WAIM 2006, Hong Kong, China, June 17-19, 2006, Proceedings, pp. 193-204, 2006, Springer, 3-540-35225-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Peer-to-Peer, Role, Privacy Protection, Pseudonymity |
38 | Ranjit Nair, Milind Tambe, Stacy Marsella |
Role allocation and reallocation in multiagent teams: towards a practical analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: The Second International Joint Conference on Autonomous Agents & Multiagent Systems, AAMAS 2003, July 14-18, 2003, Melbourne, Victoria, Australia, Proceedings, pp. 552-559, 2003, ACM, 1-58113-683-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
analysis of teams, reallocation, role allocation |
38 | Elizabeth A. Kendall |
Role Model Designs and Implementations with Aspect-oriented Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA ![In: Proceedings of the 1999 ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages & Applications, OOPSLA 1999, Denver, Colorado, USA, November 1-5, 1999., pp. 353-369, 1999, ACM, 1-58113-238-7. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
aspect-oriented programming, role modelling |
37 | Dirk Riehle, Roger Brudermann, Thomas R. Gross, Kai-Uwe Mätzel |
Pattern density and role modeling of an object transport service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Comput. Surv. ![In: ACM Comput. Surv. 32(1es), pp. 10, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
object transport, pattern application, pattern composition, pattern desity, role model composition, framework, pattern, role, role model, object migration, inter-process communication |
37 | Reinhardt A. Botha, Jan H. P. Eloff |
Designing Role Hierarchies for Access Control in Workflow Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 25th International Computer Software and Applications Conference (COMPSAC 2001), Invigorating Software Development, 8-12 October 2001, Chicago, IL, USA, pp. 117-122, 2001, IEEE Computer Society, 0-7695-1372-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
36 | Axel Mönkeberg, René Rakete |
Three for one: role-based access-control management in rapidly changing heterogeneous environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000, pp. 83-88, 2000, ACM, 1-58113-259-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
36 | Ravi S. Sandhu, David F. Ferraiolo, D. Richard Kuhn |
The NIST model for role-based access control: towards a unified standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000, pp. 47-63, 2000, ACM, 1-58113-259-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
36 | Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo |
The role mining problem: finding a minimal descriptive set of roles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 175-184, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
RBAC, role engineering, role mining |
36 | Elisa Bertino, Piero A. Bonatti, Elena Ferrari |
TRBAC: A temporal role-based access control model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 4(3), pp. 191-233, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Role triggers, role-based access control, temporal constraints |
36 | Ruth C. King, Weidong Xia |
Retaining IS talents in the new millennium: effects of socialization on IS professionals' role adjustment and organizational attachment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCPR ![In: Proceedings of the ACM SIGCPR Conference on Computer Personnel Research, San Diego, California, USA, 2001, pp. 144-156, 2001, ACM, 1-58113-363-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
and intention to quit, information systems human resources management, organizational socialization, role ambiguity, role conflict, job satisfaction, organizational commitment |
35 | Saeed Boorboor, Shawn Mathew, Mala Ananth 0001, David Talmage, Lorna W. Role, Arie E. Kaufman |
NeuRegenerate: A Framework for Visualizing Neurodegeneration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Vis. Comput. Graph. ![In: IEEE Trans. Vis. Comput. Graph. 29(3), pp. 1625-1637, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
35 | Parmida Ghahremani, Saeed Boorboor, Pooya Mirhosseini, Chetan Gudisagar, Mala Ananth 0001, David Talmage, Lorna W. Role, Arie E. Kaufman |
NeuroConstruct: 3D Reconstruction and Visualization of Neurites in Optical Microscopy Brain Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Vis. Comput. Graph. ![In: IEEE Trans. Vis. Comput. Graph. 28(12), pp. 4951-4965, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
35 | Saeed Boorboor, Shawn Mathew, Mala Ananth 0001, David Talmage, Lorna W. Role, Arie E. Kaufman |
NeuRegenerate: A Framework for Visualizing Neurodegeneration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2202.01115, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
35 | Stephane Role, Demetris Marnerides, Kurt Debattista, Stefano Cavazzi, Mehrdad Dianati |
Recognising place under distinct weather variability, a comparison between end-to-end and metric learning approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IV ![In: 2022 IEEE Intelligent Vehicles Symposium, IV 2022, Aachen, Germany, June 4-9, 2022, pp. 1360-1365, 2022, IEEE, 978-1-6654-8821-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
35 | Mira Ait Saada, François Role, Mohamed Nadif |
Classification non supervisée de documents à partir des modèles Transformeurs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EGC ![In: Extraction et Gestion des Connaissances, EGC 2022, Blois, France, 24 au 28 janvier 2022., pp. 331-338, 2022, Editions RNTI, 979-10-96289-16-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
35 | Mohamed Nadif, François Role |
Unsupervised and self-supervised deep learning approaches for biomedical text mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Briefings Bioinform. ![In: Briefings Bioinform. 22(2), pp. 1592-1603, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
35 | Mira Ait Saada, François Role, Mohamed Nadif |
How to Leverage a Multi-layered Transformer Language Model for Text Clustering: an Ensemble Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1 - 5, 2021, pp. 2837-2841, 2021, ACM, 978-1-4503-8446-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
35 | Mira Ait Saada, François Role, Mohamed Nadif |
Unsupervised Methods for the Study of Transformer Embeddings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDA ![In: Advances in Intelligent Data Analysis XIX - 19th International Symposium on Intelligent Data Analysis, IDA 2021, Porto, Portugal, April 26-28, 2021, Proceedings, pp. 287-300, 2021, Springer, 978-3-030-74250-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
35 | Saeed Boorboor, Shreeraj Jadhav, Mala Ananth 0001, David Talmage, Lorna Role, Arie E. Kaufman |
Visualization of Neuronal Structures in Wide-Field Microscopy Brain Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Vis. Comput. Graph. ![In: IEEE Trans. Vis. Comput. Graph. 25(1), pp. 1018-1028, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
35 | François Role, Stanislas Morbieu, Mohamed Nadif |
Unsupervised Evaluation of Text Co-clustering Algorithms Using Neural Word Embeddings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 27th ACM International Conference on Information and Knowledge Management, CIKM 2018, Torino, Italy, October 22-26, 2018, pp. 1827-1830, 2018, ACM, 978-1-4503-6014-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
35 | Melissa Ailem, François Role, Mohamed Nadif |
Sparse Poisson Latent Block Model for Document Clustering (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: 34th IEEE International Conference on Data Engineering, ICDE 2018, Paris, France, April 16-19, 2018, pp. 1743-1744, 2018, IEEE Computer Society, 978-1-5386-5520-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
35 | Melissa Ailem, François Role, Mohamed Nadif |
Model-based co-clustering for the effective handling of sparse data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pattern Recognit. ![In: Pattern Recognit. 72, pp. 108-122, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
35 | Melissa Ailem, François Role, Mohamed Nadif |
Sparse Poisson Latent Block Model for Document Clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 29(7), pp. 1563-1576, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
35 | Melissa Ailem, François Role, Mohamed Nadif |
Graph modularity maximization as an effective method for co-clustering text data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Knowl. Based Syst. ![In: Knowl. Based Syst. 109, pp. 160-173, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
35 | Melissa Ailem, François Role, Mohamed Nadif, Florence Demenais |
Unsupervised text mining for assessing and augmenting GWAS results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Biomed. Informatics ![In: J. Biomed. Informatics 60, pp. 252-259, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
35 | Melissa Ailem, François Role, Mohamed Nadif |
Co-clustering Document-term Matrices by Direct Maximization of Graph Modularity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 24th ACM International Conference on Information and Knowledge Management, CIKM 2015, Melbourne, VIC, Australia, October 19 - 23, 2015, pp. 1807-1810, 2015, ACM, 978-1-4503-3794-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
35 | Aghiles Salah, Nicoleta Rogovschi, François Role, Mohamed Nadif |
Pour une meilleure exploitation de la classification croisée dans les systèmes de filtrage collaboratif. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EGC ![In: 15èmes Journées Francophones Extraction et Gestion des Connaissances, EGC 2015, 27-30 Janvier 2015, Luxembourg, pp. 347-358, 2015, Hermann-Éditions. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
35 | François Role, Mohamed Nadif |
Beyond cluster labeling: Semantic interpretation of clusters' contents using a graph representation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Knowl. Based Syst. ![In: Knowl. Based Syst. 56, pp. 141-155, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
35 | François Role, Mohamed Nadif |
PPMI : étude formelle d'une variante à valeurs positives de la PMI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EGC ![In: Extraction et gestion des connaissances (EGC'2011), Actes, 25 au 29 janvier 2011, Brest, France, pp. 295-296, 2011, Hermann-Éditions, 978-2-70568-112-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
35 | François Role, Mohamed Nadif |
Handling the Impact of Low Frequency Events on Co-occurrence based Measures of Word Similarity - A Case Study of Pointwise Mutual Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDIR ![In: KDIR 2011 - Proceedings of the International Conference on Knowledge Discovery and Information Retrieval, Paris, France, 26-29 October, 2011, pp. 226-231, 2011, SciTePress, 978-989-8425-79-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
35 | Heejong Sung, Fei Ji, Deborah L. Levy, Steven Matthysse, Nancy Role Mendell |
The power of linkage analysis of a disease-related endophenotype using asymmetrically ascertained sib pairs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Stat. Data Anal. ![In: Comput. Stat. Data Anal. 53(5), pp. 1829-1842, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | François Role, Milagros Fernández Gavilanes, Éric Villemonte de la Clergerie |
Large-Scale Knowledge Acquisition from Botanical Texts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NLDB ![In: Natural Language Processing and Information Systems, 12th International Conference on Applications of Natural Language to Information Systems, NLDB 2007, Paris, France, June 27-29, 2007, Proceedings, pp. 395-400, 2007, Springer, 978-3-540-73350-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
35 | François Role, Guillaume Rousse |
Construction incrémentale d'une ontologie par analyse du texte et de la structure des documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Document Numérique ![In: Document Numérique 9(1), pp. 77-92, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
35 | Emiliana R. Simon-Thomas, Kemi O. Role, Robert T. Knight |
Behavioral and Electrophysiological Evidence of a Right Hemisphere Bias for the Influence of Negative Emotion on Higher Cognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cogn. Neurosci. ![In: J. Cogn. Neurosci. 17(3), pp. 518-529, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Eric Lecolinet, Laurent Robert, François Role |
Text-image Coupling for Editing Literary Sources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Humanit. ![In: Comput. Humanit. 36(1), pp. 49-73, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
35 | François Role, Stéphane Chaudiron, Madjid Ihadjadene |
Dealing with large documents in the Digital Library : a case study of ETD documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ELPUB ![In: Electronic Publishing '01, 2001 in the Digital Publishing Odyssey: 5th ICCC/IFIP conference held at the University of Kent - ELPUB 2001, Canterbury, UK, July 5-7, 2001. Proceedings, 2001, IOS Press, 1-58603-191-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
35 | Eric Lecolinet, Laurence Likforman-Sulem, Laurent Robert, François Role, Jean-Louis Lebrave |
An Integrated Reading and Editing Environment for Scholarly Research on Literary Works and Their Handwritten Sources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM DL ![In: Proceedings of the 3rd ACM International Conference on Digital Libraries, June 23-26, 1998, Pittsburgh, PA, USA, pp. 144-151, 1998, ACM. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
SGML |
34 | Dong-Gue Park, You-Ri Lee |
A Flexible Role-Based Delegation Model Using Characteristics of Permissions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 16th International Conference, DEXA 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, pp. 310-323, 2005, Springer, 3-540-28566-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Joon-Sang Lee, Doo-Hwan Bae, Ikju Han |
Towards Coping with Role-Binding Anomaly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Reflection ![In: Metalevel Architectures and Separation of Crosscutting Concerns, Third International Conference, REFLECTION 2001, Kyoto, Japan, September 25-28, 2001, Proceedings, pp. 272-273, 2001, Springer, 3-540-42618-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
34 | G. Naresh, B. D. Chaudhary |
A Model for Temporal relations between Object Roles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEFM ![In: Fourth IEEE International Conference on Software Engineering and Formal Methods (SEFM 2006), 11-15 September 2006, Pune, India, pp. 100-107, 2006, IEEE Computer Society, 0-7695-2678-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
role-oriented modelling, temporal role relation graph, framework, role |
34 | Tim Klaus, Cynthia LeRouge, J. Ellis Blanton |
An examination of the relationships between select nature of work characteristics and organizational commitment of IT professionals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPR ![In: Proceedings of the 2003 SIGMIS Conference on Computer Personnel Research: Freedom in Philadelphia - Leveraging Differences and Diversity in the IT Workforce, CPR 2003, Philadelphia, Pennsylvania, USA, April 10-12, 2003, pp. 147-149, 2003, ACM, 1-58113-666-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
IT retention, group cohesion, job characteristics model, nature of work, role ambiguity, role conflict, role stress, commitment, turnover |
34 | Frank Leymann, Wolfgang Reisig, Satish R. Thatte, Wil M. P. van der Aalst |
06291 Abstracts Collection -- The Role of Business Processes in Service-Oriented Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Role of Business Processes in Service Oriented Architectures ![In: The Role of Business Processes in Service Oriented Architectures, 16.07. - 21.07.2006, 2006, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
34 | John F. Barkley, Konstantin Beznosov, Jinny Uppal |
Supporting Relationships in Access Control Using Role Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999, pp. 55-65, 1999, ACM, 1-58113-180-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
34 | Luigi Giuri |
Role-Based Access Control on the Web Using Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999, pp. 11-18, 1999, ACM, 1-58113-180-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Java |
34 | Thomas Hildmann 0001, Jörg Barholdt |
Managing Trust Between Collaborating Companies Using Outsourced Role Based Acces Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999, pp. 105-111, 1999, ACM, 1-58113-180-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
34 | Jonathan D. Moffett, Emil Lupu |
The Uses of Role Hierarchies in Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999, pp. 153-160, 1999, ACM, 1-58113-180-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
34 | Konstantin Beznosov, Yi Deng 0001 |
A Framework for Implementing Role-Based Access Control Using CORBA Security Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999, pp. 19-30, 1999, ACM, 1-58113-180-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
34 | Gail-Joon Ahn, Ravi S. Sandhu |
The RSL99 Language for Role-Based Separation of Duty Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999, pp. 43-54, 1999, ACM, 1-58113-180-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
34 | John Linn, Magnus Nyström |
Attribute Certification: An Enabling Technology for Delegation and Role-Based Controls in Distributed Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999, pp. 121-130, 1999, ACM, 1-58113-180-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
34 | Ravi S. Sandhu, Joon S. Park |
Decentralized User-role Assignment for Web-based Intranets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Third ACM Workshop on Role-Based Access Control, RBAC 1998, Fairfax, VA, USA, October 22-23, 1998, pp. 1-12, 1998, ACM, 1-58113-113-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
World Wide Web (WWW) |
34 | D. Richard Kuhn |
Role Based Access Control on MLS Systems without Kernel Changes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Third ACM Workshop on Role-Based Access Control, RBAC 1998, Fairfax, VA, USA, October 22-23, 1998, pp. 25-32, 1998, ACM, 1-58113-113-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 44182 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|