Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
101 | Ninghui Li, Qihua Wang |
Beyond separation of duty: An algebra for specifying high-level security policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. ACM ![In: J. ACM 55(3), pp. 12:1-12:46, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Access control, separation of duty, policy design |
98 | Hassan Takabi, Morteza Amini, Rasool Jalili |
Separation of Duty in Role-Based Access Control Model through Fuzzy Relations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 125-130, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
94 | Jason Crampton |
Specifying and enforcing constraints in role-based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 43-50, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
enforcement context, separation of duty constraint, role-based access control, authorization constraint |
88 | Ninghui Li, Qihua Wang |
Beyond separation of duty: an algebra for specifying high-level security policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 356-369, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
access control, category, separation of duty, policy design |
85 | Richard T. Simon, Mary Ellen Zurko |
Separation of Duty in Role-based Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 10th Computer Security Foundations Workshop (CSFW '97), June 10-12, 1997, Rockport, Massachusetts, USA, pp. 183-194, 1997, IEEE Computer Society, 0-8186-7990-5. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
74 | Ninghui Li, Mahesh V. Tripunitara, Ziad Bizri |
On mutually exclusive roles and separation-of-duty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 10(2), pp. 5, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
computational complexity, verification, constraints, Role-based access control, separation-of-duty |
74 | Chunyang Yuan, Yeping He, Jianbo He, Zhouyi Zhou |
A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings, pp. 196-210, 2006, Springer, 3-540-49608-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Verification, Formal Specification, RBAC, Separation of Duty |
68 | Jon A. Solworth |
Approvability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 231-242, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authorization properties, authorization, separation of duty |
66 | Lingli Deng, Yeping He, Ziyao Xu |
Separation of Duty in Trust-Based Collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 370-388, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Secure Collaboration, Statically Mutual Exclusive Roles, Role-Based Access Control, Separation of Duty |
61 | Jianfeng Lu, Ruixuan Li 0001, Zhengding Lu, Jinwei Hu, Xiaopu Ma |
Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 403-410, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
constraint, Separation-of-Duty, usage control |
61 | Hong Chen, Ninghui Li |
Constraint generation for separation of duty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings, pp. 130-138, 2006, ACM, 1-59593-353-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
constraints, role based access control, separation of duty |
61 | Ninghui Li, Ziad Bizri, Mahesh V. Tripunitara |
On mutually-exclusive roles and separation of duty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 42-51, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
verification, constraints, role-based access control, separation of duty |
61 | Rüdiger Grimm, Patrick Aichroth |
Privacy protection for signed media files: a separation-of-duty approach to the lightweight DRM (LWDRM) system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 6th workshop on Multimedia & Security, MM&Sec 2004, Magdeburg, Germany, September 20-21, 2004, pp. 93-99, 2004, ACM, 1-58113-854-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
LWDRM, light weight digital rights management, virtual goods, privacy, pseudonyms, separation of duty |
61 | James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Bertino |
Dependencies and separation of duty constraints in GTRBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 51-64, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
security, role based access control, temporal constraints, separation of duty, cardinality constraint |
55 | Jun-Cheol Jeon, Kee-Young Yoo |
Cellular Automata Based Role-Delegation in RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACRI ![In: Cellular Automata, 7th International Conference on Cellular Automata, for Research and Industry, ACRI 2006, Perpignan, France, September 20-23, 2006, Proceedings, pp. 588-594, 2006, Springer, 3-540-40929-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Multiple-Attractor Cellular Automata, Role-Delegation, Role-based Access Control, Separation of Duty |
55 | Richard W. C. Lui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Role Activation Management in Role Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings, pp. 358-369, 2005, Springer, 3-540-26547-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Role Activation, Dynamic Separation of Duty, Role Based Access Control, Security Management |
48 | Yong-Zhong He, Zhan Han, Ying Cai |
A Fine Grained RBAC Model Supporting Flexible Administrative Separation of Duty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings, pp. 192-195, 2010, IEEE Computer Society, 978-1-4244-8378-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
administrative Separation of Duty, prerequisite role, fine-grained |
46 | Jan Mendling, Karsten Ploesser, Mark Strembeck |
Specifying Separation of Duty Constraints in BPEL4People Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BIS ![In: Business Information Systems, 11th International Conference, BIS 2008, Innsbruck, Austria, May 5-7, 2008. Proceedings, pp. 273-284, 2008, Springer, 978-3-540-79395-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Matunda Nyanchama, Sylvia L. Osborn |
Role-Based Security, Object Oriented Databases & Separation of Duty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Rec. ![In: SIGMOD Rec. 22(4), pp. 45-51, 1993. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
42 | David A. Basin, Felix Klaedtke, Samuel Müller 0002 |
Monitoring security policies with metric first-order temporal logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings, pp. 23-34, 2010, ACM, 978-1-4503-0049-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
access control, monitoring, temporal logic, security policies, compliance, separation of duty, usage control |
42 | Jianfeng Lu, Ruixuan Li 0001, Vijay Varadharajan, Zhengding Lu, Xiaopu Ma |
Secure Interoperation in Multidomain Environments Employing UCON Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 395-402, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Multidomain, cyclic inheritance, interoperation, separation of duty, usage control |
42 | Christian Wolter, Andreas Schaad, Christoph Meinel |
Task-based entailment constraints for basic workflow patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings, pp. 51-60, 2008, ACM, 978-1-60558-129-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
task-based entailment constraints, access control, workflow management, separation of duty, workflow modelling |
42 | James Joshi, Elisa Bertino, Usman Latif, Arif Ghafoor |
A Generalized Temporal Role-Based Access Control Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 17(1), pp. 4-23, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Access control, temporal constraints, separation of duty, role-based, role hierarchy |
42 | David F. Ferraiolo, Ramaswamy Chandramouli, Gail-Joon Ahn, Serban I. Gavrila |
The role control center: features and case studies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 12-20, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
administrative roles, role graph, separation of duty, role hierarchy, authorization management |
42 | HyungHyo Lee, BongNam Noh |
An Integrity Enforcement Application Design and Operation Framework in Role-Based Access Control Systems: A Session-Oriented Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: Proceedings of the 1999 International Conference on Parallel Processing Workshops, ICPPW 1999, Wakamatsu, Japan, September 21-24, 1999, pp. 179-184, 1999, IEEE Computer Society, 0-7695-0353-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
access control, integrity, RBAC, security model, separation of duty |
39 | Ninghui Li, Qihua Wang, Mahesh V. Tripunitara |
Resiliency Policies in Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 12(4), pp. 20:1-20:34, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
fault-tolerant, Access control, policy design |
35 | Christian Wolter, Andreas Schaad |
Modeling of Task-Based Authorization Constraints in BPMN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BPM ![In: Business Process Management, 5th International Conference, BPM 2007, Brisbane, Australia, September 24-28, 2007, Proceedings, pp. 64-79, 2007, Springer, 978-3-540-75182-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Security in business processes, Business process modeling and analysis |
33 | Rattikorn Hewett, Phongphun Kijsanayothin, Aashay Thipse |
Security Analysis of Role-based Separation of Duty with Workflows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 765-770, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Chenggong Lv, Jun Wang 0059, Lu Liu, Weijia You |
The Separation of Duty with Privilege Calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RSKT ![In: Rough Sets and Knowledge Technology, Third International Conference, RSKT 2008, Chengdu, China, May 17-19, 2008. Proceedings, pp. 410-417, 2008, Springer, 978-3-540-79720-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | SeongKi Kim, EunKyung Jin, YoungJin Song, Sang-Yong Han |
Design and Implementation of Fast Access Control That Supports the Separation of Duty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings, pp. 211-224, 2006, Springer, 3-540-49608-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Flask, Access control, RBAC, SELinux, DAC |
31 | Andreas Schaad, Volkmar Lotz, Karsten Sohr |
A model-checking approach to analysing organisational controls in a loan origination process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings, pp. 139-149, 2006, ACM, 1-59593-353-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
organisational control, model-checking, delegation, separation, revocation |
29 | David A. Basin, Samuel J. Burri, Günter Karjoth |
Obstruction-Free Authorization Enforcement: Aligning Security with Business Objectives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, Cernay-la-Ville, France, 27-29 June, 2011, pp. 99-113, 2011, IEEE Computer Society, 978-1-61284-644-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Access control, workflow, Separation of Duty, authorization constraint |
29 | Christopher Alm, Roland Illig |
Translating High-Level Authorization Constraints to XACML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERVICES ![In: 6th World Congress on Services, SERVICES 2010, Miami, Florida, USA, July 5-10, 2010, pp. 629-636, 2010, IEEE Computer Society, 978-0-7695-4129-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
OPL, RBAC, Translation, XACML, Separation of Duty |
29 | Nuno Amálio |
Suspicion-Driven Formal Analysis of Security Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 217-223, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Security, planning, requirements, confidentiality, formal analysis, separation of duty, Event-Calculus |
29 | Akhil Kumar 0001, Rong Liu |
A Rule-Based Framework Using Role Patterns for Business Process Compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RuleML ![In: Rule Representation, Interchange and Reasoning on the Web, International Symposium, RuleML 2008, Orlando, FL, USA, October 30-31, 2008. Proceedings, pp. 58-72, 2008, Springer, 978-3-540-88807-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
generic role patterns, compliant business process, task categories, declarative approach, Sarbanes-oxley, constraints, rules, separation of duty, internal control, control policies |
29 | Michael LeMay, Omid Fatemieh, Carl A. Gunter |
PolicyMorph: interactive policy transformations for a logical attribute-based access control framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 205-214, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
policy administration, constraints, separation of duty, attribute based access control |
29 | Manigandan Radhakrishnan, Jon A. Solworth |
Application security support in the operating system kernel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 201-211, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authorization properties, access controls, operating systems, authorization, information flow, separation of duty |
29 | David F. Ferraiolo, Serban I. Gavrila, Vincent C. Hu, D. Richard Kuhn |
Composing and combining policies under the policy machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings, pp. 11-20, 2005, ACM, 1-59593-045-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
access control, role based access control, separation of duty, multi-level security |
26 | Subhendu Aich, Samrat Mondal, Shamik Sural, Arun K. Majumdar |
Role Based Access Control with Spatiotemporal Context for Mobile Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Comput. Sci. ![In: Transactions on Computational Science IV, Special Issue on Security in Computing, pp. 177-199, 2009, Springer, 978-3-642-01003-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Spatiotemporal domain, Role extent, Permission extent, Spatiotemporal SOD and Telemedicine |
26 | Lijun Yu, Robert B. France, Indrakshi Ray, Kevin Lano |
A light-weight static approach to analyzing UML behavioral properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 12th International Conference on Engineering of Complex Computer Systems (ICECCS 2007), 10-14 July 2007, Auckland, New Zealand, pp. 56-63, 2007, IEEE Computer Society, 978-0-7695-2895-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Dong-Gue Park, You-Ri Lee |
A Flexible Role-Based Delegation Model Using Characteristics of Permissions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 16th International Conference, DEXA 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, pp. 310-323, 2005, Springer, 3-540-28566-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Chin |
A Modal Logic for Role-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 179-193, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Till Mossakowski, Michael Drouineaud, Karsten Sohr |
A temporal-logic extension of role-based access control covering dynamic separation of duties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TIME ![In: 10th International Symposium on Temporal Representation and Reasoning / 4th International Conference on Temporal Logic (TIME-ICTL 2003), 8-10 July 2003, Cairns, Queensland, Australia, pp. 83-90, 2003, IEEE Computer Society, 0-7695-1912-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Christopher Alm, Ruben Wolf, Joachim Posegga |
The OPL Access Control Policy Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings, pp. 138-148, 2009, Springer, 978-3-642-03747-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Kaijun Tan, Jason Crampton, Carl A. Gunter |
The Consistency of Task-Based Authorization Constraints in Workflow Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 17th IEEE Computer Security Foundations Workshop, (CSFW-17 2004), 28-30 June 2004, Pacific Grove, CA, USA, pp. 155-, 2004, IEEE Computer Society, 0-7695-2169-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Benyuan Yang |
Enforcement of separation of duty constraints in attribute-based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 131, pp. 103294, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Wei Sun 0026, Hui Su, Huacheng Xie |
Policy-Engineering Optimization with Visual Representation and Separation-of-Duty Constraints in Attribute-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 12(10), pp. 164, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Wei Sun 0026, Shiwei Wei, Huaping Guo, Hongbing Liu |
Role-Mining Optimization with Separation-of-Duty Constraints and Security Detections for Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 11(9), pp. 201, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Muhammad Umar Aftab, Zhiguang Qin, Negalign Wake Hundera, Oluwasanmi Ariyo, Zakria, Ngo Tung Son, Tran Van Dinh |
Permission-Based Separation of Duty in Dynamic Role-Based Access Control Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 11(5), pp. 669, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Yang Bo, Chunhe Xia, Yang Luo, Qing Tang |
Static compliance checking beyond separation of duty constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Embed. Syst. ![In: Int. J. Embed. Syst. 10(5), pp. 423-436, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya |
Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 13(4), pp. 897-911, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | J. D. Ultra, Susan Pancho-Festin |
A simple model of separation of duty for access control models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 68, pp. 69-80, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Prasuna Sarana, Arindam Roy, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri |
Role Mining in the Presence of Separation of Duty Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 98-117, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
20 | Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya |
Enforcing Separation of Duty in Attribute Based Access Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 61-78, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
20 | Yang Bo, Chunhe Xia, Yang Luo, Qing Tang |
Static Compliance Checking beyond Separation of Duty Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
3PGCIC ![In: 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Guangdong, China, November 8-10, 2014, pp. 171-178, 2014, IEEE Computer Society, 978-1-4799-4171-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
20 | David A. Basin, Samuel J. Burri, Günter Karjoth |
Dynamic enforcement of abstract separation of duty constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 15(3), pp. 13:1-13:30, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Jianfeng Lu, Ruixuan Li 0001, Jinwei Hu, Dewu Xu |
Static Enforcement of Static Separation-of-Duty Policies in Usage Control Authorization Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Commun. ![In: IEICE Trans. Commun. 95-B(5), pp. 1508-1518, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Arindam Roy, Shamik Sural, Arun K. Majumdar |
Minimum user requirement in Role Based Access Control with Separation of Duty constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISDA ![In: 12th International Conference on Intelligent Systems Design and Applications, ISDA 2012, Kochi, India, November 27-29, 2012, pp. 386-391, 2012, IEEE, 978-1-4673-5117-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Marzieh Esna-Ashari, Hamid R. Rabiee, Seyed-Hassan Mirian-Hosseinabadi |
Reliability of separation of duty in ANSI standard role-based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. Iran. ![In: Sci. Iran. 18(6), pp. 1416-1424, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Muhammad Asif Habib, Christian Praher |
Object based dynamic separation of duty in RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, ICITST 2009, London, UK, November 9-12, 2009, pp. 1-5, 2009, IEEE, 978-1-4244-5648-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | David A. Basin, Samuel J. Burri, Günter Karjoth |
Dynamic Enforcement of Abstract Separation of Duty Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 250-267, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Chenggong Lv, Jun Wang, Lu Liu, Weijia You |
The Separation of Duty with Privilege Calculus ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0806.1284, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
20 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello |
An Activity-Based Model for Separation of Duty ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0810.5351, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
20 | Marco Anisetti, Valerio Bellandi, Ernesto Damiani, Gabriele Gianini |
Assessing Separation of Duty Policies through the Interpretation of Sampled Video Sequences: A Pair Programming Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
New Directions in Intelligent Interactive Multimedia ![In: New Directions in Intelligent Interactive Multimedia, pp. 555-564, 2008, Springer, 978-3-540-68126-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Weihe Chen, Zhu Tang, Shiguang Ju |
Enforcement of Spatial Separation of Duty Constraint. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2108-2114, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Lingli Deng, Yeping He, Ziyao Xu |
Enforcing Separation of Duty in Ad Hoc Collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 1545-1552, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Khaled Alghathbar |
Validating the enforcement of access control policies and separation of duty principle in requirement engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Softw. Technol. ![In: Inf. Softw. Technol. 49(2), pp. 142-157, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Andreas Schaad, Pascal Spadone, Helmut Weichsel |
A case study of separation of duty properties in the context of the Austrian "eLaw" process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005, pp. 1328-1332, 2005, ACM, 1-58113-964-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
organisational control, workflow security, e-Government, legislation, electronic documents |
20 | Chang-Joo Moon, Dae-Ha Park, Soung-Jin Park, Doo-Kwon Baik |
Symmetric RBAC model that takes the separation of duty and role hierarchies into consideration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 23(2), pp. 126-136, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Duen-Ren Liu, Mei-Yu Wu, Shu-Teng Lee |
Role-based authorizations for workflow systems in support of task-based separation of duty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Softw. ![In: J. Syst. Softw. 73(3), pp. 375-387, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Mark Strembeck |
Conflict checking of separation of duty constraints in RBAC - implementation experiences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IASTED Conf. on Software Engineering ![In: IASTED International Conference on Software Engineering, part of the 22nd Multi-Conference on Applied Informatics, Innsbruck, Austria, February 17-19, 2004, pp. 224-229, 2004, IASTED/ACTA Press, 0-88986-381-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
20 | Willem Engelbrecht |
Access control and separation of duty in agent-based workflow environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSA ![In: Proceedings of the ISSA 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa, pp. 1-12, 2002, ISSA, Pretoria, South Africa. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
20 | Stephen Perelson, Reinhardt A. Botha, Jan H. P. Eloff |
Separation of Duty administration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
South Afr. Comput. J. ![In: South Afr. Comput. J. 27, pp. 64-69, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
20 | C. Papenfus, Reinhardt A. Botha |
An XML based approach to enforcing history-based separation of duty policies in heterogeneous workflow environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
South Afr. Comput. J. ![In: South Afr. Comput. J. 26, pp. 60-68, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
20 | Stephen Perelson, Reinhardt A. Botha |
Conflict analysis as a means of enforcing static separation of duty requirements in workflow environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
South Afr. Comput. J. ![In: South Afr. Comput. J. 26, pp. 212-216, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
20 | Gail-Joon Ahn, Ravi S. Sandhu |
The RSL99 Language for Role-Based Separation of Duty Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999, pp. 43-54, 1999, ACM, 1-58113-180-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
20 | Virgil D. Gligor, Serban I. Gavrila, David F. Ferraiolo |
On the Formal Definition of Separation-of-Duty Policies and their Composition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: Security and Privacy - 1998 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 3-6, 1998, Proceedings, pp. 172-183, 1998, IEEE Computer Society, 0-8186-8386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
20 | D. Richard Kuhn |
Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 23-30, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
20 | LouAnna Notargiacomo, Barbara T. Blaustein, Catherine D. McCollum |
Merging Models: Integrity, Dynamic Separation of Duty, and Trusted Data Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 3(2/3), pp. 207-230, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
20 | LouAnna Notargiacomo, Barbara T. Blaustein, Catherine D. McCollum |
A Model of Integrity Separation of Duty for a Trusted DBMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Database Security, VII: Status and Prospects, Proceedings of the IFIP WG11.3 Working Conference on Database Security, Lake Guntersville, Alabama, USA, 12-15 September, 1993, pp. 237-256, 1993, North-Holland, 0-444-81833-2. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP BibTeX RDF |
|
20 | Simon N. Foley |
Separation of Duty using High Water Marks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 79-88, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
20 | Michael J. Nash, K. R. Poland |
Some Conundrums Concerning Separation of Duty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: Proceedings of the 1990 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990, pp. 201-209, 1990, IEEE Computer Society, 0-8186-2060-9. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
17 | Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta |
Security validation tool for business processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 16th ACM Symposium on Access Control Models and Technologies, SACMAT 2011, Innsbruck, Austria, June 15-17, 2011, Proceedings, pp. 143-144, 2011, ACM, 978-1-4503-0688-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
13 | Hind Rakkay, Hanifa Boucheneb |
Security Analysis of Role Based Access Control Models Using Colored Petri Nets and CPNtools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Comput. Sci. ![In: Transactions on Computational Science IV, Special Issue on Security in Computing, pp. 149-176, 2009, Springer, 978-3-642-01003-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
CPNtools, security formal verification, RBAC, Colored Petri nets |
13 | Fei Yan, Philip W. L. Fong |
Efficient IRM enforcement of history-based access control policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 35-46, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
distributed optimization protocol, history-based access control policies, language-based security, security automata, inlined reference monitors |
13 | Samrat Mondal, Shamik Sural |
XML-based policy specification framework for spatiotemporal access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 98-103, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
estarbac, permission extent, role extent, spatiotemporal policy specification, xml |
13 | Rodolfo Ferrini, Elisa Bertino |
Supporting RBAC with XACML+OWL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009, Proceedings, pp. 145-154, 2009, ACM, 978-1-60558-537-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
OWL ontology, XACML, access control model, rbac |
13 | Chao Huang, Jianling Sun, Xinyu Wang 0001, Yuanjie Si |
Selective Regression Test for Access Control System Employing RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 70-79, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, RBAC, regression test, test selection, policy verification |
13 | Philip W. L. Fong |
Discretionary capability confinement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 7(2), pp. 137-154, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Scoping rule, Access control, Java Virtual Machine, Capability, Language-based security, Confinement |
13 | Samrat Mondal, Shamik Sural |
A Verification Framework for Temporal RBAC with Role Hierarchy (Short Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings, pp. 140-147, 2008, Springer, 978-3-540-89861-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Temporal RBAC, Model Checking, Verification, Timed Automata, CTL |
13 | Yue Zhang 0002, James B. D. Joshi |
UAQ: a framework for user authorization query processing in RBAC extended with hybrid hierarchy and constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings, pp. 83-92, 2008, ACM, 978-1-60558-129-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
hybrid hierarchy, authorization, RBAC, administration, role mapping |
13 | Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Nabil R. Adam |
Migrating to optimal RBAC with minimal perturbation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings, pp. 11-20, 2008, ACM, 978-1-60558-129-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
RBAC, role engineering, role mining |
13 | David F. Ferraiolo, Vijay Atluri |
A meta model for access control: why is it needed and is it even possible to achieve? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings, pp. 153-154, 2008, ACM, 978-1-60558-129-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Philippe Balbiani, Yannick Chevalier, Marwa El Houri |
A Logical Approach to Dynamic Role-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIMSA ![In: Artificial Intelligence: Methodology, Systems, and Applications, 13th International Conference, AIMSA 2008, Varna, Bulgaria, September 4-6, 2008. Proceedings, pp. 194-208, 2008, Springer, 978-3-540-85775-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Access control language, RBAC, privacy policy |
13 | Haoliang Zhai, Gansen Zhao, Lei Li, Jianxiong Huang |
A Role-Based Access Control Model for Complex Affairs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 646-650, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Qihua Wang, Ninghui Li, Hong Chen |
On the Security of Delegation in Access Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, pp. 317-332, 2008, Springer, 978-3-540-88312-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Karsten Sohr, Tanveer Mustafa, Xinyu Bao, Gail-Joon Ahn |
Enforcing Role-Based Access Control Policies in Web Services with UML and OCL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 257-266, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Shujing Wang 0001, Yan Zhang 0003 |
Handling distributed authorization with delegation through answer set programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 6(1), pp. 27-46, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Access control, Knowledge representation, Authorization, Trust management, Delegation, Nonmonotonic reasoning, Answer set programming |
13 | Maria Luisa Damiani, Elisa Bertino, Barbara Catania, Paolo Perlasca |
GEO-RBAC: A spatially aware RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 10(1), pp. 2, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
GIS, location-based services, access-control model |
13 | Aniruddha Bohra, Stephen Smaldone, Liviu Iftode |
FRAC: Implementing Role-Based Access Control for Network File Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007), 12 - 14 July 2007, Cambridge, MA, USA, pp. 95-104, 2007, IEEE Computer Society, 0-7695-2922-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|