|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 936 occurrences of 345 keywords
|
|
|
Results
Found 1029 publication records. Showing 1029 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
33 | Jinwei Hu, Yan Zhang 0003, Ruixuan Li 0001, Zhengding Lu |
Role updating for assignments. |
SACMAT |
2010 |
DBLP DOI BibTeX RDF |
role updating, model checking, role engineering, rbac |
33 | Mario Frank 0001, David A. Basin, Joachim M. Buhmann |
A class of probabilistic models for role engineering. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
clustering, machine learning, RBAC, role mining |
33 | Zhiming Liu 0001, Charles Morisset, Volker Stolz |
A Component-Based Access Control Monitor. |
ISoLA |
2008 |
DBLP DOI BibTeX RDF |
Access Control, Component, Composition, RBAC |
33 | Philippe Balbiani, Yannick Chevalier, Marwa El Houri |
A Logical Approach to Dynamic Role-Based Access Control. |
AIMSA |
2008 |
DBLP DOI BibTeX RDF |
Access control language, RBAC, privacy policy |
33 | Anil L. Pereira, Vineela Muppavarapu, Soon Myoung Chung |
Role-Based Access Control for Grid Database Services Using the Community Authorization Service. |
IEEE Trans. Dependable Secur. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Open Grid Services Architecture-Data Access and Integration (OGSA-DAI), Grid database services, fine-grain authorization, Community Authorization Service (CAS), role-based access control (RBAC) |
33 | Xiangpeng Zhao, Antonio Cerone, Padmanabhan Krishnan |
Verifying BPEL Workflows Under Authorisation Constraints. |
Business Process Management |
2006 |
DBLP DOI BibTeX RDF |
model-checking, Workflow, RBAC, BPEL |
33 | Ying Chen, Shoubao Yang, Leitao Guo, Pengzhan Liu, Kai Shen |
Design and Implementation of Dynamic-Role Based Access Control Framework in Grid Environment. |
ITCC (2) |
2005 |
DBLP DOI BibTeX RDF |
DRBAC, RBAC, Trust Management, ECAS |
33 | Jean Bacon, Ken Moody, Walt Yao |
A model of OASIS role-based access control and its support for active security. |
ACM Trans. Inf. Syst. Secur. |
2002 |
DBLP DOI BibTeX RDF |
distributed systems, RBAC, role-based access control, policy, service-level agreements, Certificates, OASIS |
32 | Mohsen Saffarian, Babak Sadighi |
Owner-Based Role-Based Access Control OB-RBAC. |
ARES |
2010 |
DBLP DOI BibTeX RDF |
Administrative Policies, Access Control, RBAC, Delegation |
32 | Hsing-Chung Chen, Shiuh-Jeng Wang, Jyh-Horng Wen, Chung-Wei Chen |
Temporal and Location-Based RBAC Model. |
NCM |
2009 |
DBLP DOI BibTeX RDF |
TLRBAC, Access Control, RBAC |
32 | Jinwei Hu, Ruixuan Li 0001, Zhengding Lu |
On Role Mappings for RBAC-Based Secure Interoperation. |
NSS |
2009 |
DBLP DOI BibTeX RDF |
RBAC, administration, secure interoperation, role mappings |
32 | Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Nabil R. Adam |
Migrating to optimal RBAC with minimal perturbation. |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
RBAC, role engineering, role mining |
32 | Gansen Zhao, David W. Chadwick |
On the Modeling of Bell-LaPadula Security Policies Using RBAC. |
WETICE |
2008 |
DBLP DOI BibTeX RDF |
Bell-LaPadula Security Policies, Modelling, RBAC |
32 | Yong-Zhong He, Zhan Han, Ye Du |
Configuring RBAC to Simulate Bell Model. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
Bell model, Simulation, RBAC |
32 | Sudip Chakraborty, Indrajit Ray |
TrustBAC: integrating trust relationships into the RBAC model for access control in open systems. |
SACMAT |
2006 |
DBLP DOI BibTeX RDF |
access control, trust, RBAC |
32 | Pete Epstein, Ravi S. Sandhu |
Towards a UML Based Approach to Role Engineering. |
ACM Workshop on Role-Based Access Control |
1999 |
DBLP DOI BibTeX RDF |
Lilac, UML, unified modeling language, RBAC, role based access control, role engineering |
32 | Cheh Goh, Adrian Baldwin |
Towards a More Complete Model of Role. |
ACM Workshop on Role-Based Access Control |
1998 |
DBLP DOI BibTeX RDF |
constraint-based, access control, management, RBAC, role-based |
32 | Emil Lupu, Morris Sloman |
Reconciling role based management and role based access control. |
ACM Workshop on Role-Based Access Control |
1997 |
DBLP DOI BibTeX RDF |
role object model, RBAC, role engineering, distributed systems management |
27 | Çagdas Cirit, Feza Buzluca |
A UML profile for role-based access control. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
tagged value, role-based access control, model driven architecture, object constraint language, unified modeling language profile, model validation, stereotype, security engineering |
27 | Yuan Tian 0003, Biao Song, Eui-nam Huh |
A purpose-based privacy-aware system using privacy data graph. |
MoMM |
2009 |
DBLP DOI BibTeX RDF |
privacy data graph, privacy, role based access control |
27 | Khaled Gaaloul, François Charoy |
Task Delegation Based Access Control Models for Workflow Systems. |
I3E |
2009 |
DBLP DOI BibTeX RDF |
Access Control, Workflow, Delegation, Task, Authorisation |
27 | Ligang He, Mark Calleja, Mark Hayes, Stephen A. Jarvis |
Performance prediction for running workflows under role-based authorization mechanisms. |
IPDPS |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Scott D. Stoller, Ping Yang 0002, Mikhail I. Gofman, C. R. Ramakrishnan 0001 |
Symbolic reachability analysis for parameterized administrative role based access control. |
SACMAT |
2009 |
DBLP DOI BibTeX RDF |
parameterized administrative role based access control, security policy analysis |
27 | Slim Kallel, Anis Charfi, Mira Mezini, Mohamed Jmaiel, Karl Klose |
From Formal Access Control Policies to Runtime Enforcement Aspects. |
ESSoS |
2009 |
DBLP DOI BibTeX RDF |
|
27 | François Lecellier, Jalal Fadili, Stéphanie Jehan-Besson, Marinette Revenu, Gilles Aubert |
Region-based active contours and sparse representations for texture segmentation. |
ICPR |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Hui Zhao, Zhiyi Fang, Peng Xu, Lianyu Zhao, Jin Liu, Tianyang Wang |
An Improved Role-Based Workflow Access Control Model. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
authorization restriction, Access control, workflow, transaction, task |
27 | Richard O. Sinnott, David W. Chadwick, Thomas Doherty, David B. Martin, Anthony Stell, Gordon Stewart 0002, Linying Su, John P. Watt |
Advanced Security for Virtual Organizations: The Pros and Cons of Centralized vs Decentralized Security Models. |
CCGRID |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Karsten Sohr, Tanveer Mustafa, Xinyu Bao, Gail-Joon Ahn |
Enforcing Role-Based Access Control Policies in Web Services with UML and OCL. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Zhenxing Luo, Jing Chen, Zuoquan Lin |
Hybrid role hierarchy for the extended role based access control model. |
LCN |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Indrakshi Ray, Manachai Toahchoodee |
A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications. |
TrustBus |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Clara Bertolissi, Maribel Fernández, Steve Barker |
Dynamic Event-Based Access Control as Term Rewriting. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Qun Ni, Dan Lin 0001, Elisa Bertino, Jorge Lobo 0001 |
Conditional Privacy-Aware Role Based Access Control. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Marco Pistoia, Stephen J. Fink, Robert J. Flynn, Eran Yahav |
When Role Models Have Flaws: Static Validation of Enterprise Security Policies. |
ICSE |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Hua Wang 0002, Jiuyong Li, Ron Addie, Stijn Dekeyser, Richard Watson 0001 |
A framework for role-based group deligation in distributed environments. |
ACSC |
2006 |
DBLP BibTeX RDF |
|
27 | Wei Dao, Yong Tang 0001, Na Tang, Gaofeng Ji |
Temporal Role Hierarchies. |
CSCWD |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Sylvia L. Osborn |
Role-based access control: past, present and future. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Misun Moon, Dong Seong Kim 0001, Jong Sou Park |
Toward Modeling Sensor Node Security Using Task-Role Based Access Control with TinySec. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Hua Wang 0002, Jinli Cao, Yanchun Zhang |
A Flexible Payment Scheme and Its Role-Based Access Control. |
IEEE Trans. Knowl. Data Eng. |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Jaime A. Pavlich-Mariscal, Laurent Michel, Steven A. Demurjian |
A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming. |
MoDELS |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Cungang Yang, Chang N. Zhang |
A Privacy Enhanced Role-Based Access Control Model for Enterprises. |
ICCNMC |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Richard W. C. Lui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Role Activation Management in Role Based Access Control. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
Role Activation, Dynamic Separation of Duty, Role Based Access Control, Security Management |
27 | Basit Shafiq, Ammar Masood, James Joshi, Arif Ghafoor |
A Role-Based Access Control Policy Verification Framework for Real-Time Systems. |
WORDS |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Wolfgang Eßmayr, Stefan Probst, Edgar R. Weippl |
Role-Based Access Controls: Status, Dissemination, and Prospects for Generic Security Mechanisms. |
Electron. Commer. Res. |
2004 |
DBLP DOI BibTeX RDF |
security, access control, software framework |
27 | Dirk Schwartmann |
An Attributable Role-Based Access Control for Healthcare. |
International Conference on Computational Science |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Fahad T. Alotaiby, Jim X. Chen |
A Model for Team-based Access Control (TMAC 2004). |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | András Belokosztolszki, Ken Moody, David M. Eyers |
A Formal Model for Hierarchical Policy Contexts. |
POLICY |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Steve Barker, Peter J. Stuckey |
Flexible access control policy specification with constraint logic programming. |
ACM Trans. Inf. Syst. Secur. |
2003 |
DBLP DOI BibTeX RDF |
Role-based access control, constraint logic programming |
27 | Frédéric Cuppens, Alexandre Miège |
Administration Model for Or-BAC. |
OTM Workshops |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Sylvia L. Osborn, Yan Han, Jun Liu |
A methodology for managing roles in legacy systems. |
SACMAT |
2003 |
DBLP DOI BibTeX RDF |
relational databases, role-based access control |
27 | Song-hwa Chae, Wonil Kim, Dong-Kyoo Kim |
A Novel Approach to Role-Based Access Control. |
International Conference on Computational Science |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Peter Herrmann |
Formal Security Policy Verification of Distributed Component-Structured Software. |
FORTE |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Gail-Joon Ahn |
Specification and Classification of Role-based Authorization Policies. |
WETICE |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Arun Kumar 0002, Neeran M. Karnik, Girish Chafle |
Context sensitivity in role-based access control. |
ACM SIGOPS Oper. Syst. Rev. |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Hua Wang 0002, Jinli Cao, Yanchun Zhang |
Formal Authorization Allocation Approaches for Role-Based Access Control Based on Relational Algebra Operations. |
WISE |
2002 |
DBLP DOI BibTeX RDF |
|
27 | C. Joncheng Kuo, Polar Humenn |
Dynamically authorized role-based access control for secure distributed computation. |
XML Security |
2002 |
DBLP DOI BibTeX RDF |
XML-based security assertions, authorization domain, CORBA, Role-based access control, attribute certificates |
27 | Joon S. Park, Ravi S. Sandhu, Gail-Joon Ahn |
Role-based access control on the web. |
ACM Trans. Inf. Syst. Secur. |
2001 |
DBLP DOI BibTeX RDF |
WWW security, World Wide Web (WWW), role-based access control, cookies, digital certificates |
27 | Elisa Bertino, Piero A. Bonatti, Elena Ferrari |
TRBAC: A temporal role-based access control model. |
ACM Trans. Inf. Syst. Secur. |
2001 |
DBLP DOI BibTeX RDF |
Role triggers, role-based access control, temporal constraints |
27 | Sofia K. Tzelepi, Dimitrios K. Koukopoulos, George Pangalos |
A flexible content and context-based access control model for multimedia medical image database systems. |
MM&Sec |
2001 |
DBLP DOI BibTeX RDF |
|
27 | Gail-Joon Ahn, Michael E. Shin |
Role-Based Authorization Constraints Specification Using Object Constraint Language. |
WETICE |
2001 |
DBLP DOI BibTeX RDF |
|
27 | Gail-Joon Ahn, Ravi S. Sandhu |
Role-based authorization constraints specification. |
ACM Trans. Inf. Syst. Secur. |
2000 |
DBLP DOI BibTeX RDF |
role-based access control, access control models, authorization constraints, constraints specification |
27 | Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce |
A Formal Model for Role-Based Access Control Using Graph Transformation. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
|
27 | Paul Ashley, Mark Vandenwauver |
Using SESAME to Implement Role-Based Access Control in Unix File Systems. |
WETICE |
1999 |
DBLP DOI BibTeX RDF |
|
26 | |
LoT-RBAC. |
Encyclopedia of Database Systems |
2009 |
DBLP DOI BibTeX RDF |
|
26 | |
RBAC Standard. |
Encyclopedia of Database Systems |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde |
Mining Stable Roles in RBAC. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Xuewang Zhang, Yulin Zhang |
Study on an Improved Extended-RBAC Model. |
WKDD |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Guneshi T. Wickramaarachchi, Wahbeh H. Qardaji, Ninghui Li |
An efficient framework for user authorization queries in RBAC systems. |
SACMAT |
2009 |
DBLP DOI BibTeX RDF |
constraints, role based access control |
26 | Solomon Berhe, Steven A. Demurjian, Thomas Agresta |
Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Remo Mueller, Van Anh Tran, Guo-Qiang Zhang 0001 |
A Scalable Parametric-RBAC Architecture for the Propagation of a Multi-modality, Multi-resource Informatics System. |
ICEIS |
2009 |
DBLP DOI BibTeX RDF |
Scalable information system, Web 2.0, Role-based access control |
26 | Ed Coyne, Timothy R. Weil |
An RBAC Implementation and Interoperability Standard: The INCITS Cyber Security 1.1 Model. |
IEEE Secur. Priv. |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Haiyan Wu, Chengxiang Tan, Haihang Wang |
A Hybrid RBAC-PBAC Access Control Model for Network Isolation System. |
WKDD |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Bhavani Thuraisingham, Srinivasan Iyer 0003 |
Extended RBAC - Based Design and Implementation for a Secure Data Warehouse. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Xiangning Zhou, Zhaolong Wang |
An Access Control Model of Workflow System Integrating RBAC and TBAC. |
I3E (2) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Li Ma, Shilong Ma, Yuefei Sui |
A Dynamic Description Logic Approach to Extended RBAC Model. |
FGCN (1) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Xiaoli Ren, Lu Liu, Chenggong Lv |
An Object-Dependent and Context Constraints-Aware Access Control Approach Based on RBAC. |
CONFENIS (2) |
2007 |
DBLP DOI BibTeX RDF |
Context constraints, Role-based access control, Security policy, SoD, Object-dependent |
26 | Tuan-Anh Nguyen, Linying Su, George Inman, David W. Chadwick |
Flexible and Manageable Delegation of Authority in RBAC. |
AINA Workshops (2) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik |
Access Control Policy Management Framework based on RBAC in OSGi Service Platform. |
CIT |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Mingchao Ma, Steve Woodhead |
Constraint-Enabled Distributed RBAC for Subscription-Based Remote Network Services. |
CIT |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik |
An Effective Policy Management Framework Using RBAC model for Service Platform based on Components. |
SERA |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Yuqing Sun 0001, Xiangxu Meng, Fang Yin |
A Novel Approach for Role Hierarchies in Flexible RBAC Workflow. |
EDOC |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Cheng Zang, Zhongdong Huang, Gang Chen 0001, Jinxiang Dong |
A State-Transfer-Based Dynamic Policy Approach for Constraints in RBAC. |
WAIM |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Yuqing Sun 0001, Xiangxu Meng, Shijun Liu, Peng Pan |
Flexible Workflow Incorporated with RBAC. |
CSCWD (Selected papers) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Wataru Yamazaki, Hironori Hiraishi, Fumio Mizoguchi |
Designing an Agent-Based RBAC System for Dynamic Security Policy. |
WETICE |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Weizhong Qiang, Hai Jin 0001, Xuanhua Shi, Deqing Zou, Hao Zhang 0069 |
RB-GACA: A RBAC Based Grid Access Control Architecture. |
GCC (1) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Gustaf Neumann, Mark Strembeck |
A scenario-driven role engineering process for functional RBAC roles. |
SACMAT |
2002 |
DBLP DOI BibTeX RDF |
role-based access control, scenarios, role engineering |
26 | Yaying Zhang, Jinyuan You |
An RBAC Based Policy Enforcement Coordination Model in Internet Environment. |
EDCIS |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Won Bo Shim, Seog Park |
Web Document Access Control Using Two-Layered Storage Structures with RBAC Server. |
EurAsia-ICT |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Won Bo Shim, Seog Park |
The Work Concept RBAC Model for the Access Control of the Distributed Web Server Environment. |
Web Intelligence |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Michael Hitchens, Vijay Varadharajan |
RBAC for XML Document Stores. |
ICICS |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Haio Roeckle, Gerhard Schimpf, Rupert Weidinger |
Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. |
ACM Workshop on Role-Based Access Control |
2000 |
DBLP DOI BibTeX RDF |
enterprise process modeling, security data models, single point of administration and control, access control, authorizations, role based access control, business processes, heterogeneous systems, security models, security management, security administration |
26 | Mary Ellen Zurko, Richard T. Simon, Tom Sanfilippo |
A User-Centered, Modular Authorization Service Built on an RBAC Foundation. |
S&P |
1999 |
DBLP DOI BibTeX RDF |
|
24 | Xiaopu Ma, Ruixuan Li 0001, Zhengding Lu |
Role mining based on weights. |
SACMAT |
2010 |
DBLP DOI BibTeX RDF |
similarity, weight, role engineering, role mining, rbac |
24 | Ian M. Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo 0001, Luke Dickens |
Mining roles with noisy data. |
SACMAT |
2010 |
DBLP DOI BibTeX RDF |
prediction, approximation, noise, role mining, rbac |
24 | Diala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar |
XeNA: an access negotiation framework using XACML. |
Ann. des Télécommunications |
2009 |
DBLP DOI BibTeX RDF |
Access control, Interoperability, RBAC, Trust management, XACML, OrBAC |
24 | Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anastasakis, Geri Georg, Behzad Bordbar |
Ensuring spatio-temporal access control for real-world applications. |
SACMAT |
2009 |
DBLP DOI BibTeX RDF |
spatio-temporal rbac, alloy, uml |
24 | Ian M. Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao, Qihua Wang, Jorge Lobo 0001 |
Evaluating role mining algorithms. |
SACMAT |
2009 |
DBLP DOI BibTeX RDF |
evaluation, role engineering, role mining, rbac |
24 | Garfield Zhiping Wu, Sylvia L. Osborn, Xin Jin |
Database Intrusion Detection Using Role Profiling with Role Hierarchy. |
Secure Data Management |
2009 |
DBLP DOI BibTeX RDF |
Role profiling, Intrusion detection, RBAC, Database security, Insider threats |
24 | Yijun Yu, Haruhiko Kaiya, Hironori Washizaki, Yingfei Xiong 0001, Zhenjiang Hu, Nobukazu Yoshioka |
Enforcing a security pattern in stakeholder goal models. |
QoP |
2008 |
DBLP DOI BibTeX RDF |
model transformations, goal models, security patterns, rbac |
24 | Elke Franz 0001, Christin Groba, Thomas Springer 0001, Mike Bergmann |
A Comprehensive Approach for Context-dependent Privacy Management. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
partial identities, context-awareness, RBAC, PIM |
24 | Cui-ru Wang, Shuang-xi Liu |
Study on Fuzzy Theory Based Web Access Control Model. |
ISIP |
2008 |
DBLP DOI BibTeX RDF |
Access Control, Web, RBAC, Fuzzy Theory |
Displaying result #201 - #300 of 1029 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|