Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
44 | Jae-Deok Lim, Sung-Kyong Un, Jeong-Nyeo Kim, ChoelHoon Lee |
Implementation of LSM-Based RBAC Module for Embedded System. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Wei Shi, Jian Wu 0001, Ying Li 0001, Zhaohui Wu 0001, Bo Wang |
Using Improved FOAF to Enhance BPEL-extracted RBAC Capability. |
Web Intelligence |
2007 |
DBLP DOI BibTeX RDF |
|
44 | NuerMaimaiti Heilili, Yang Chen, Chen Zhao 0001, Zhenxing Luo, Zuoquan Lin |
An OWL-Based Approach for RBAC with Negative Authorization. |
KSEM |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Yahui Lu, Li Zhang 0065, Yinbo Liu, Jiaguang Sun 0001 |
A Distributed Domain Administration of RBAC Model in Collaborative Environments. |
CSCWD |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Noa Tuval, Ehud Gudes |
Resolving Information Flow Conflicts in RBAC Systems. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
role graph consistency, canonical groups, Role based access control |
44 | Jun-Cheol Jeon, Kee-Young Yoo |
Cellular Automata Based Role-Delegation in RBAC. |
ACRI |
2006 |
DBLP DOI BibTeX RDF |
Multiple-Attractor Cellular Automata, Role-Delegation, Role-based Access Control, Separation of Duty |
44 | Frode Hansen, Vladimir A. Oleshchuk |
Conformance Checking of RBAC Policy and its Implementation. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Timothy E. Squair, Edgard Jamhour, Ricardo Nabhen |
A RBAC-Based Policy Information Base. |
POLICY |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Seungyong Lee 0001, Yongmin Kim 0005, BongNam Noh, HyungHyo Lee |
A New Authorization Model for Workflow Management System Using the RPI-RBAC Model. |
International Conference on Computational Science |
2004 |
DBLP DOI BibTeX RDF |
|
44 | Michael Drouineaud, Maksym Bortin, Paolo Torrini, Karsten Sohr |
A First Step Towards Formal Verification of Security Policy Properties for RBAC. |
QSIC |
2004 |
DBLP DOI BibTeX RDF |
|
44 | András Belokosztolszki, David M. Eyers, Ken Moody |
Policy Contexts: Controlling Information Flow in Parameterised RBAC. |
POLICY |
2003 |
DBLP DOI BibTeX RDF |
|
44 | YongHoon Yi, MyongJae Kim, YoungLok Lee, HyungHyo Lee, BongNam Noh |
Applying RBAC Providing Restricted Permission Inheritance to a Corporate Web Environment. |
APWeb |
2003 |
DBLP DOI BibTeX RDF |
|
44 | Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce |
A graph-based formalism for RBAC. |
ACM Trans. Inf. Syst. Secur. |
2002 |
DBLP DOI BibTeX RDF |
Access control in information systems, decentralized administration, permission management, role-based access control, correctness, graph transformations |
44 | Won Bo Shim, Seog Park |
Toward an Improved RBAC Model for the Organic Organization. |
ICPADS |
2002 |
DBLP DOI BibTeX RDF |
|
44 | Thomas Gebhardt, Thomas Hildmann 0001 |
Enabling technologies for role based online decision engines. |
ACM Workshop on Role-Based Access Control |
2000 |
DBLP DOI BibTeX RDF |
|
44 | Elisa Bertino, Piero A. Bonatti, Elena Ferrari |
TRBAC: a temporal role-based access control model. |
ACM Workshop on Role-Based Access Control |
2000 |
DBLP DOI BibTeX RDF |
|
43 | Lunwei Wang, Lifeng Wei, Xiangke Liao, Huaimin Wang |
AT-RBAC: An Authentication Trustworthiness-Based RBAC Model. |
GCC Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Hind Rakkay, Hanifa Boucheneb |
Security Analysis of Role Based Access Control Models Using Colored Petri Nets and CPNtools. |
Trans. Comput. Sci. |
2009 |
DBLP DOI BibTeX RDF |
CPNtools, security formal verification, RBAC, Colored Petri nets |
43 | Ashish Kamra, Evimaria Terzi, Elisa Bertino |
Detecting anomalous access patterns in relational databases. |
VLDB J. |
2008 |
DBLP DOI BibTeX RDF |
Intrusion detection, Anomaly detection, RBAC, DBMS, User profiles |
43 | Vijay Atluri |
Panel on role engineering. |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
RBAC, role engineering, role mining |
43 | Timothy W. Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu 0001, Ravi S. Sandhu, William H. Winsborough, Bhavani Thuraisingham |
ROWLBAC: representing role based access control in OWL. |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
ontology, semantic web, RBAC, OWL, access control model |
43 | Philip Inglesant, Martina Angela Sasse, David W. Chadwick, Lei Lei Shi |
Expressions of expertness: the virtuous circle of natural language for access control policy specification. |
SOUPS |
2008 |
DBLP DOI BibTeX RDF |
access control, Grid computing, authorization, RBAC, observations, qualitative methods, controlled natural language |
43 | Sejong Oh, Ravi S. Sandhu, Xinwen Zhang |
An effective role administration model using organization structure. |
ACM Trans. Inf. Syst. Secur. |
2006 |
DBLP DOI BibTeX RDF |
role administration, Access control, RBAC, role-based access control |
43 | Sejong Oh, Ravi S. Sandhu |
A model for role administration using organization structure. |
SACMAT |
2002 |
DBLP DOI BibTeX RDF |
role administration, access control, RBAC |
41 | Koji Hasebe, Mitsuhiro Mabuchi, Akira Matsushita |
Capability-based delegation model in RBAC. |
SACMAT |
2010 |
DBLP DOI BibTeX RDF |
capability-based access control, delegation, rbac |
41 | Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam 0001 |
Role-based access control (RBAC) in Java via proxy objects using annotations. |
SACMAT |
2010 |
DBLP DOI BibTeX RDF |
proxy objects, java, access control, RBAC, rmi |
41 | Maha Aburahma, Reinhard Stumptner |
Modeling location attributes using XACML-RBAC model. |
MoMM |
2009 |
DBLP DOI BibTeX RDF |
access control, location-based services, RBAC, XACML |
41 | Kyu Il Kim, Won Gil Choi, Eun-Ju Lee, Ung-Mo Kim |
RBAC-based access control for privacy protection in pervasive environments. |
ICUIMC |
2009 |
DBLP DOI BibTeX RDF |
privacy, access control, RBAC, pervasive environments |
41 | Yue Zhang 0002, James B. D. Joshi |
UAQ: a framework for user authorization query processing in RBAC extended with hybrid hierarchy and constraints. |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
hybrid hierarchy, authorization, RBAC, administration, role mapping |
41 | Qiang Wei, Jason Crampton, Konstantin Beznosov, Matei Ripeanu |
Authorization recycling in RBAC systems. |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
authorization recycling, access control, RBAC, SAAM |
41 | Kyu Il Kim, Hyuk Jin Ko, Hyun Sik Hwang, Ung-Mo Kim |
Context RBAC/MAC Access Control for Ubiquitous Environment. |
DASFAA |
2007 |
DBLP DOI BibTeX RDF |
Access Control, RBAC, MAC |
41 | Di Wu, Xiyuan Chen, Jian Lin, Miaoliang Zhu |
Ontology-Based RBAC Specification for Interoperation in Distributed Environment. |
ASWC |
2006 |
DBLP DOI BibTeX RDF |
Ontology, interoperation, RBAC, access control policy |
41 | Shu-Ching Chen, Mei-Ling Shyu, Na Zhao 0003 |
SMARXO: towards secured multimedia applications by adopting RBAC, XML and object-relational database. |
ACM Multimedia |
2004 |
DBLP DOI BibTeX RDF |
XML, role-based access control (RBAC), object-relational databases, multimedia security |
41 | Xinwen Zhang, Sejong Oh, Ravi S. Sandhu |
PBDM: a flexible delegation model in RBAC. |
SACMAT |
2003 |
DBLP DOI BibTeX RDF |
access control, RBAC, delegation |
37 | Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri |
Towards formal security analysis of GTRBAC using timed automata. |
SACMAT |
2009 |
DBLP DOI BibTeX RDF |
GTRBAC, model checking, timed automata, security analysis, ctl |
37 | Hassan Takabi, Minsoo Kim 0001, James B. D. Joshi, Michael B. Spring |
An architecture for specification and enforcement of temporal access control constraints using OWL. |
SWS |
2009 |
DBLP DOI BibTeX RDF |
gtrbac, access control, temporal constraints, owl |
37 | Steve Barker, Marek J. Sergot, Duminda Wijesekera |
Status-Based Access Control. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
distributed security, status-based access control, logic, algebras |
37 | Rattikorn Hewett, Phongphun Kijsanayothin, Aashay Thipse |
Security Analysis of Role-based Separation of Duty with Workflows. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Amirreza Masoumzadeh 0001, James B. D. Joshi |
PuRBAC: Purpose-Aware Role-Based Access Control. |
OTM Conferences (2) |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Yubin Bao, Jie Song 0001, Daling Wang, Derong Shen, Ge Yu 0001 |
A Role and Context Based Access Control Model with UML. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Ninghui Li, Mahesh V. Tripunitara, Ziad Bizri |
On mutually exclusive roles and separation-of-duty. |
ACM Trans. Inf. Syst. Secur. |
2007 |
DBLP DOI BibTeX RDF |
computational complexity, verification, constraints, Role-based access control, separation-of-duty |
37 | Yuri Demchenko, Leon Gommans, Cees de Laat |
Extending Role Based Access Control Model for Distributed Multidomain Applications. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Feng Chen 0004, Shaoyun Li, Hongji Yang |
Enforcing Role-Based Access Controls in Software Systems with an Agent Based Service Oriented Approach. |
ICNSC |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Ninghui Li, Mahesh V. Tripunitara |
Security analysis in role-based access control. |
ACM Trans. Inf. Syst. Secur. |
2006 |
DBLP DOI BibTeX RDF |
role-based administration, Role-based access control, trust management, delegation |
37 | Romuald Thion, Stéphane Coulondre |
Modeling and Inferring on Role-Based Access Control Policies Using Data Dependencies. |
DEXA |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Amit Sasturkar, Ping Yang 0002, Scott D. Stoller, C. R. Ramakrishnan 0001 |
Policy Analysis for Administrative Role Based Access Control. |
CSFW |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Muhammad Alam, Michael Hafner, Ruth Breu |
A constraint based role based access control in the SECTET a model-driven approach. |
PST |
2006 |
DBLP DOI BibTeX RDF |
service oriented architectures, role based access control, model-driven architecture, model-driven security |
37 | Dong-Gue Park, You-Ri Lee |
A Flexible Role-Based Delegation Model Using Characteristics of Permissions. |
DEXA |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Wei Li 0025, Edward B. Allen |
An Access Control Model for Secure Cluster-Computing Environments. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Chin |
A Modal Logic for Role-Based Access Control. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Ninghui Li, Mahesh V. Tripunitara |
Security analysis in role-based access control. |
SACMAT |
2004 |
DBLP DOI BibTeX RDF |
role-based administration, role-based access control, trust management, delegation |
37 | Sihn-Hye Park, Wonil Kim, Dong-Kyoo Kim |
Autonomic Protection System Using Adaptive Security Policy. |
ICCSA (3) |
2004 |
DBLP DOI BibTeX RDF |
|
37 | Peng Liu, Zhong Chen |
An Access Control Model for Web Services in Business Process. |
Web Intelligence |
2004 |
DBLP DOI BibTeX RDF |
|
37 | Jim J. Longstaff, Mike A. Lockyer, John Nicholas |
The tees confidentiality model: an authorisation model for identities and roles. |
SACMAT |
2003 |
DBLP DOI BibTeX RDF |
|
37 | Sofia K. Tzelepi, George Pangalos |
A Flexible Role-Based Access Control Model for Multimedia Medical Image Database Systems. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
|
37 | Sofia K. Tzelepi, George Pangalos |
A Flexible Access Control Model for Multimedia Medical Image Security. |
IEEE Pacific Rim Conference on Multimedia |
2001 |
DBLP DOI BibTeX RDF |
|
37 | Ravi S. Sandhu, Qamar Munawer |
The ARBAC99 Model for Administration of Roles. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
|
37 | Mats Gustafsson, Benoit Deligny, Nahid Shahmehri |
Using NFS to Implement Role-Based Access Control. |
WETICE |
1997 |
DBLP DOI BibTeX RDF |
Linux User Space NFS Server, exported file system, access control information management, Linux 2.0 system, performance, distributed systems, role-based access control, legacy systems, authorisation, code optimization, Network File System |
35 | Kang-hak Han, Junghwan Choi, Sanghyun Ryu, Hyun-Su Jang, Young Ik Eom |
Design of RBAC-based secure KAgent framework for home network applications. |
MoMM |
2009 |
DBLP DOI BibTeX RDF |
mobile agents, role-based access control, role, home networks |
35 | Mahesh V. Tripunitara, Bogdan Carbunar |
Efficient access enforcement in distributed role-based access control (RBAC) deployments. |
SACMAT |
2009 |
DBLP DOI BibTeX RDF |
access control, efficiency, bloom filter, enforcement |
35 | Jinwei Hu, Ruixuan Li 0001, Zhengding Lu |
RBAC-Based Secure Interoperation Using Constraint Logic Programming. |
CSE (2) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Mei-Yu Wu, Chih-Kun Ke, Wen-Ling Tzeng |
Applying Context-Aware RBAC to RFID Security Management for Application in Retail Business. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
35 | David F. Ferraiolo, D. Richard Kuhn, Ravi S. Sandhu |
RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control". |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Jinwei Hu, Ruixuan Li 0001, Zhengding Lu |
Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Jung-Hwa Chae, Nematollaah Shiri |
Formalization of RBAC Policy with Object Class Hierarchy. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Prasanna H. Bammigatti, P. R. Rao |
GenericWA-RBAC: Role Based Access Control Model for Web Applications. |
ICIT |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Jiong Qiu, Chen-hua Ma, Jianwei Yin, Jinxiang Dong |
Research and Implementation of Role-Based RBAC Administration Model. |
CIT |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Jaime A. Pavlich-Mariscal, Thuong Doan, Laurent Michel, Steven A. Demurjian, T. C. Ting |
Role Slices: A Notation for RBAC Permission Assignment and Enforcement. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Aneta Poniszewska-Maranda, Gilles Goncalves, Fred Hemery |
Representation of Extended RBAC Model Using UML Language. |
SOFSEM |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athena Vakali |
Intrusion Detection in RBAC-administered Databases. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Min Wook Kil, Sijung Kim, Youngmi Kwon, Geuk Lee |
Network Intrusion Protection System Using Rule-Based DB and RBAC Policy. |
NPC |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Steve Barker, Paul Douglas |
Protecting Federated Databases Using A Practical Implementation of a Formal RBAC Policy. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Jan Mendling, Mark Strembeck, Gerald Stermsek, Gustaf Neumann |
An Approach to Extract RBAC Models from BPEL4WS Processes. |
WETICE |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Dong-Gue Park, You-Ri Lee |
The RBAC Based Privilege Management for Authorization of Wireless Networks. |
WAIM |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Ricardo Nabhen, Edgard Jamhour, Carlos Maziero |
A Policy-based Framework for RBAC. |
DSOM |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Dong-Gue Park, You-Ri Lee |
The ET-RBAC Based Privilege Management Infrastructure for Wireless Networks. |
EC-Web |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Ricardo Nabhen, Edgard Jamhour, Carlos Maziero |
RBPIM: A PCIM-Based Framework for RBAC. |
LCN |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Andrew D. Marshall |
A Financial Institution's Legacy Mainframe Access Control System in Light of the Proposed NIST RBAC Standard. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
35 | Gustaf Neumann, Mark Strembeck |
Design and implementation of a flexible RBAC-service in an object-oriented scripting language. |
CCS |
2001 |
DBLP DOI BibTeX RDF |
XOTcl, object-orientation, web-applications, role-based access control, mobile code, scripting language |
35 | Chang N. Zhang, Cungang Yang |
An Object-Oriented RBAC Model for Distributed System. |
WICSA |
2001 |
DBLP DOI BibTeX RDF |
|
35 | Paul Ashley, Bradley Broom, Mark Vandenwauver |
An Implementation of a Secure Version of NFS Including RBAC. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
34 | K. Rajesh Rao, Ashalatha Nayak, Indranil Ghosh Ray, Yogachandran Rahulamathavan, Muttukrishnan Rajarajan |
Role recommender-RBAC: Optimizing user-role assignments in RBAC. |
Comput. Commun. |
2021 |
DBLP DOI BibTeX RDF |
|
34 | Yi Ding 0009, Jun Jin 0010, Jinglun Zhang, Zhongyi Wu, Kai Hu 0004 |
SC-RBAC: A Smart Contract based RBAC Model for DApps. |
HCC |
2019 |
DBLP DOI BibTeX RDF |
|
34 | Barsha Mitra, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri |
Migrating from RBAC to temporal RBAC. |
IET Inf. Secur. |
2017 |
DBLP DOI BibTeX RDF |
|
34 | Gang Liu 0006, Runnan Zhang, Huimin Song, Can Wang, Jinhui Liu, Aijun Liu |
Ts-RBAC: A RBAC model with transformation. |
Comput. Secur. |
2016 |
DBLP DOI BibTeX RDF |
|
34 | Mikko Kiviharju |
RBAC with ABS - Implementation Practicalities for RBAC Integrity Policies. |
SECRYPT |
2014 |
DBLP DOI BibTeX RDF |
|
34 | Antonio Tapiador, Diego Carrera, Joaquín Salvachúa |
Tie-RBAC: An application of RBAC to Social Networks |
CoRR |
2012 |
DBLP BibTeX RDF |
|
34 | Michael S. Kirkpatrick, Maria Luisa Damiani, Elisa Bertino |
Prox-RBAC: a proximity-based spatially aware RBAC. |
GIS |
2011 |
DBLP DOI BibTeX RDF |
|
34 | Junghwan Choi, Hyun-Su Jang, Young Ik Eom |
CA-RBAC: Context Aware RBAC Scheme in Ubiquitous Computing Environments. |
J. Inf. Sci. Eng. |
2010 |
DBLP BibTeX RDF |
|
34 | Ahlem Bouchahda, Nhan Le Thanh, Adel Bouhoula, Faten Labbene |
RBAC+: Dynamic Access Control for RBAC-Administered Web-Based Databases. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
34 | Ana Ferreira 0001, David W. Chadwick, Pedro Farinha, Ricardo João Cruz Correia, Gansen Zhao, Rui Chilro, Luis Filipe Coelho Antunes |
How to Securely Break into RBAC: The BTG-RBAC Model. |
ACSAC |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Ambra Molesini, Enrico Denti, Andrea Omicini |
RBAC-MAS and SODA: Experimenting RBAC in AOSE. |
ESAW |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Glenn Faden |
RBAC in UNIX Administration. |
ACM Workshop on Role-Based Access Control |
1999 |
DBLP DOI BibTeX RDF |
UNIX |
34 | Joon S. Park, Ravi S. Sandhu |
RBAC on the Web by Smart Certificates. |
ACM Workshop on Role-Based Access Control |
1999 |
DBLP DOI BibTeX RDF |
|
34 | Raymond K. Wong 0001 |
RBAC support in object-oriented role databases. |
ACM Workshop on Role-Based Access Control |
1997 |
DBLP DOI BibTeX RDF |
object-oriented role database, role-based access control, database security |
34 | William J. Meyers |
RBAC emulation on trusted DG/UX. |
ACM Workshop on Role-Based Access Control |
1997 |
DBLP DOI BibTeX RDF |
|
34 | Larry S. Bartz |
hyperDRIVE: leveraging LDAP to implement RBAC on the Web. |
ACM Workshop on Role-Based Access Control |
1997 |
DBLP DOI BibTeX RDF |
Java, Internet |
34 | Charles E. Youman |
RBAC transition. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
34 | Ravi S. Sandhu |
Issues in RBAC. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
34 | Edward J. Coyne |
Prioritizing RBAC features. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|