The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for RBAC with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1995 (22) 1996-1997 (21) 1998-1999 (43) 2000 (22) 2001 (28) 2002 (35) 2003 (56) 2004 (58) 2005 (80) 2006 (90) 2007 (103) 2008 (105) 2009 (74) 2010 (45) 2011 (39) 2012 (31) 2013 (32) 2014 (24) 2015 (21) 2016 (21) 2017-2018 (25) 2019 (21) 2020-2021 (19) 2022-2024 (14)
Publication types (Num. hits)
article(179) incollection(11) inproceedings(830) phdthesis(4) proceedings(5)
Venues (Conferences, Journals, ...)
SACMAT(83) ACM Workshop on Role-Based Acc...(82) DBSec(23) ACM Trans. Inf. Syst. Secur.(18) ACSAC(15) ARES(15) WETICE(15) CoRR(11) POLICY(11) Comput. Secur.(9) IAS(9) ICISS(9) SAC(9) AsiaCCS(8) CCS(8) CSCWD(7) More (+10 of total 455)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 936 occurrences of 345 keywords

Results
Found 1029 publication records. Showing 1029 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
24Devdatta Kulkarni, Anand Tripathi Context-aware role-based access control in pervasive computing systems. Search on Bibsonomy SACMAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF context-based access control, pervasive computing, RBAC, context-aware computing
24David Mera, José Manuel Cotos, José Ramon Rios Viqueira, José Varela 0001 A User Management Web System Based on Portlets for a Grid Environment Integrating Shibboleth, PURSe, PERMIS and Gridsphere. Search on Bibsonomy DCAI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF PERMIS, PURSe, Grid Computing, RBAC, PKI, Portlets, Shibboleth
24Z. Cliffe Schreuders, Christian Payne Reusability of Functionality-Based Application Confinement Policy Abstractions. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Functionality-Based Application Confinement (FBAC), Application-Oriented Access Control, Application Confinement, Reusable Policy, Role-Based Access Control (RBAC), Usable Security, Sandbox
24Anil L. Pereira, Vineela Muppavarapu, Soon M. Chung Managing Role-Based Access Control Policies for Grid Databases in OGSA-DAI Using CAS. Search on Bibsonomy J. Grid Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Open Grid Services Architecture - Data Access and Integration (OGSA-DAI), Grid databases, Community Authorization Service (CAS), role-based access control (RBAC), virtual organization (VO)
24Hua Wang 0002, Jinli Cao Delegating Revocations and Authorizations. Search on Bibsonomy Business Process Management Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RBAC, Delegation, Revocation
24Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens An Integrated Model for Access Control and Information Flow Requirements. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DTE, RBAC, Security Policy, MLS, OrBAC
24Jongil Jeong, Dongil Shin, Dongkyoo Shin An XML-Based Security Architecture for Integrating Single Sign-On and Rule-Based Access Control in Mobile and Ubiquitous Web Environments. Search on Bibsonomy OTM Workshops (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF access control, mobile device, RBAC, XACML, single sign-on, SAML
24Axel Kern, Claudia Walhorn Rule support for role-based access control. Search on Bibsonomy SACMAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF SAM Jupiter, automated identity management, directoriescase studies, enterprise role-based access control (ERBAC), provisioning engine, rulesaccess rights, security provisioning, role-based access control (RBAC), rule engine, security administration
24Ramaswamy Chandramouli Enterprise access policy enforcement for applications through hybrid models and XSLT technologies. Search on Bibsonomy ICEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF domain type enforcement (DTE), policy rules, role-based access control (RBAC), XML schema, XSLT, provisioning
24Hamdan Dammag, Nimal Nissanke A Mathematical Framework for Safecharts. Search on Bibsonomy ICFEM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Step Semantics, Security, Safety, Statecharts, rbac
24Rafael R. Obelheiro, Joni da Silva Fraga Role-Based Access Control for CORBA Distributed Object Systems. Search on Bibsonomy WORDS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF security, access control, CORBA, RBAC
24John Hale, Mauricio Papa, Oliver Bremer, Rodrigo Chandia, Sujeet Shenoi Extending Java for Package based Access Control. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF package based access control, programmable security, TBAC, primitive ticket, language translation preprocessor, security service library, ticket management, Java, object-oriented programming, RBAC, MAC, source code, software libraries, syntax, authorisation, program interpreters, DAC, Java language, bytecode interpretation
24Zhongdong Zhang, Ernst Georg Haffner, Andreas Heuer 0002, Thomas Engel 0001, Christoph Meinel Role-based access control in online authoring and publishing systems vs. document hierarchy. Search on Bibsonomy SIGDOC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Web authoring system, document hierarchy, online authoring and publishing, workflow, WEB, RBAC, role-based access control
18Yan Zhu 0010, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang Cryptographic role-based security mechanisms based on role-key hierarchy. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF role-based cryptosystem, role-key hierarchy, access control, pairing-based cryptosystem
18Shuliang Zheng, Doingxing Jiang, Qixin Liu A Role and Activity Based Access Control Model for University Identity and Access Management System. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde A Probabilistic Bound on the Basic Role Mining Problem and Its Applications. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson Package-Role Based Authorization Control Model for Wireless Network Services. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Jianfeng Lu, Ruixuan Li 0001, Vijay Varadharajan, Zhengding Lu, Xiaopu Ma Secure Interoperation in Multidomain Environments Employing UCON Policies. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Multidomain, cyclic inheritance, interoperation, separation of duty, usage control
18Federica Paci, Rodolfo Ferrini, Yuqing Sun 0001, Elisa Bertino Authorization and User Failure Resiliency for WS-BPEL Business Processes. Search on Bibsonomy ICSOC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello A cost-driven approach to role engineering. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF data mining, role-based access control, role engineering, role mining, cost optimization
18Manabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, Kazumasa Omote, Kouichi Tanimoto, Takashi Horie, Kazuhiko Kato, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Maria Luisa Damiani, Claudio Silvestri Towards movement-aware access control. Search on Bibsonomy SPRINGL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, privacy, GIS, geospatial data
18Haoliang Zhai, Gansen Zhao, Lei Li, Jianxiong Huang A Role-Based Access Control Model for Complex Affairs. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Paloma Díaz 0001, Ignacio Aedo, Daniel Sanz, Alessio Malizia A model-driven approach for the visual specification of Role-Based Access Control policies in web systems. Search on Bibsonomy VL/HCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Tomoya Enokido, Makoto Takizawa 0001 Role Based Access Control in Distributed Object Systems. Search on Bibsonomy ICDCS Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Tomoya Enokido, Makoto Takizawa 0001 Synchronization of Transactions to Prevent Illegal Information Flow in a Role-Based Access Control Model. Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Rrole-based access control, Confinement problem, Information Flow
18Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt AmTRUE: Authentication Management and Trusted Role-based Authorization in Multi-Application and Multi-User Environment. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Arnaud Dury, Sergiy Boroday, Alexandre Petrenko, Volkmar Lotz Formal Verification of Business Workflows and Role Based Access Control Systems. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Scott D. Stoller, Ping Yang 0002, C. R. Ramakrishnan 0001, Mikhail I. Gofman Efficient policy analysis for administrative role based access control. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Yi Zheng, Yongming Chen, Patrick C. K. Hung Privacy Access Control Model with Location Constraints for XML Services. Search on Bibsonomy ICDE Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Lijun Dong, Shengsheng Yu, Kai Ouyang The Dynamic Endpoint-Based Access Control Model on VPN. Search on Bibsonomy IEEE NAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Liang Xiao 0002, Andrew Peet, Paul H. Lewis, Srinandan Dashmapatra, Carlos Sáez, Madalina Croitoru, Javier Vicente, Horacio González-Vélez, Magí Lluch i Ariet An Adaptive Security Model for Multi-agent Systems and Application to a Clinical Trials Environment. Search on Bibsonomy COMPSAC (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Jung-Hwa Chae, Nematollaah Shiri Description Logic Framework for Access Control and Security in Object-Oriented Systems. Search on Bibsonomy RSFDGrC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Role-based access control, description logic, object-oriented system, access control List
18Qun Ni, Alberto Trombetta, Elisa Bertino, Jorge Lobo 0001 Privacy-aware role based access control. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF model, privacy, role based access control, purpose
18Indrakshi Ray, Manachai Toahchoodee A Spatio-temporal Role-Based Access Control Model. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Kai Ouyang, Xiaowen Chu 0001, Yixin Jiang, Hsiao-Hwa Chen, Jiangchuan Liu On the Homonymous Role in Role-Based Discretionary Access Control. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Gansen Zhao, David W. Chadwick, Sassa Otenko Obligations for Role Based Access Control. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Hassan Takabi, Morteza Amini, Rasool Jalili Trust-Based User-Role Assignment in Role-Based Access Control. Search on Bibsonomy AICCSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Ritesh Kumar Tiwari, Vishal Dwivedi, Kamalakar Karlapalem SLA Driven Process Security through Monitored E-contracts. Search on Bibsonomy IEEE SCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Jungin Kim, Bhavani Thuraisingham Dependable and Secure TMO Scheme. Search on Bibsonomy ISORC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Yanhong A. Liu, Chen Wang, Michael Gorbovitski, Tom Rothamel, Yongxi Cheng, Yingchao Zhao 0001, Jing Zhang Core role-based access control: efficient implementations by transformations. Search on Bibsonomy PEPM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF complexity guarantees, optimization, access control, transformation, incrementalization
18Indrakshi Ray, Mahendra Kumar, Lijun Yu LRBAC: A Location-Aware Role-Based Access Control Model. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Yuping Deng, Xiaowei Guo, Xiamu Niu A New Design Scheme of Role-Based Access Control Based on PKI. Search on Bibsonomy ICICIC (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Siqing Du, James B. D. Joshi Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy. Search on Bibsonomy SACMAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multidomain, role based access control, hierarchy, secure interoperation, role mapping
18Sönke Busch, Björn Muschall, Günther Pernul, Torsten Priebe Authrule: A Generic Rule-Based Authorization Module. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Steve Barker, Maribel Fernández Term Rewriting for Access Control. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Kun Wang, Zhenguo Ding, Lihua Zhou Efficient Access Control in Wireless Network. Search on Bibsonomy IAT Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Hong Zhang, Yeping He, Zhiguo Shi Spatial Context in Role-Based Access Control. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Leon Pan, Chang N. Zhang A Criterion-Based Role-Based Multilayer Access Control Model for Multimedia Applications. Search on Bibsonomy ISM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Hung Le Xuan, Nguyen Ngoc Diep, Yonil Zhung, Sungyoung Lee, Young-Koo Lee A Flexible and Scalable Access Control for Ubiquitous Computing Environments. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Muhammad Alam, Michael Hafner, Ruth Breu Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTET. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF administrative role based access control, permission-level delegation, service oriented architectures, model-driven architecture
18Jin Wang, Jia Yu 0005, Daxing Li, Xi Bai 0002, Zhongtian Jia Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Muhammad Alam, Michael Hafner, Ruth Breu, Stefan Unterthiner A Framework for Modeling Restricted Delegation in Service Oriented Architecture. Search on Bibsonomy TrustBus The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Fan Hong, Yongquan Cui Administrative Usage Control Model for Secure Interoperability. Search on Bibsonomy PDCAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Andrea Omicini, Alessandro Ricci, Mirko Viroli An algebraic approach for modelling organisation, roles and contexts in MAS. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Ying Huang, Santhosh Kumaran, Jen-Yao Chung A model-driven framework for enterprise service management. Search on Bibsonomy Inf. Syst. E Bus. Manag. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Enterprise service management, Web services, Service-oriented architecture, Model-driven architecture
18James Joshi, Elisa Bertino, Usman Latif, Arif Ghafoor A Generalized Temporal Role-Based Access Control Model. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Access control, temporal constraints, separation of duty, role-based, role hierarchy
18Young-Gab Kim, Chang-Joo Moon, Dongwon Jeong, Jeong-Oog Lee, Chee-Yang Song, Doo-Kwon Baik Context-Aware Access Control Mechanism for Ubiquitous Applications. Search on Bibsonomy AWIC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu Secure Role Activation and Authorization in the Enterprise Environment. Search on Bibsonomy EuroPKI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Role Activation, Role Based Access Control, Proxy Signature, Digital Credential
18Robert Steele, Will Tao An Architecture for Unifying Web Services Authentication and Authorization. Search on Bibsonomy ICSOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Raman Adaikkalavan, Sharma Chakravarthy SmartGate: a smart push-pull approach to support role-based security in web gateways. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RB security, fire-walls, web gateways, role-based access control
18Qi Li 0002, Jingpu Shi, Sihan Qing An Administration Model of DRBAC on the Web. Search on Bibsonomy ICEBE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Song-hwa Chae, Wonil Kim, Dong-Kyoo Kim Role-Based Access Control Model for Ubiquitous Computing Environment. Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Xu Liao, Li Zhang 0065, Stephen Chi-fai Chan A Task-Oriented Access Control Model for WfMS. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Suroop Mohan Chandran, James B. D. Joshi Towards administration of a hybrid role hierarchy. Search on Bibsonomy IRI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Hanbing Yao, Heping Hu, Baohua Huang, Ruixuan Li 0001 Dynamic Role and Context-Based Access Control for Grid Applications. Search on Bibsonomy PDCAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Horst F. Wedde, Mario Lischka Modular authorization and administration. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Petri-Nets, Modularity, composability, work-flow
18Ninghui Li, Ziad Bizri, Mahesh V. Tripunitara On mutually-exclusive roles and separation of duty. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF verification, constraints, role-based access control, separation of duty
18Mahesh V. Tripunitara, Ninghui Li Comparing the expressive power of access control models. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF augmented typed access matrix, state-matching reduction, typed access matrix, role-based access control, reduction, expressive power, discretionary access control
18HyungHyo Lee, YoungLok Lee, BongNam Noh A Framework for Modeling Organization Structure in Role Engineering. Search on Bibsonomy PARA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Chiara Braghin, Daniele Gorla, Vladimiro Sassone A Distributed Calculus for Ro^le-Based Access Control. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Xuhui Ao, Naftaly H. Minsky On the role of roles: from role-based to role-sensitive access control. Search on Bibsonomy SACMAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF access control policy specification and decentralized enforcement, security, role-based access control, law-governed interaction
18Shengli Sheng, Sylvia L. Osborn A Classifier-Based Approach to User-Role Assignment for Web Applications. Search on Bibsonomy Secure Data Management The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Deholo Nali, Carlisle M. Adams, Ali Miri Using Mediated Identity-Based Cryptography to Support Role-Based Access Control. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Chang-Joo Moon, Hoh Peter In Inconsistency Detection of Authorization Policies in Distributed Component Environment. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Hua Wang 0002, Yanchun Zhang, Jinli Cao, Jian Yang Specifying Role-Based Access Constraints with Object Constraint Language. Search on Bibsonomy APWeb The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Roosdiana Wonohoesodo, Zahir Tari A Role based Access Control for Web Services. Search on Bibsonomy IEEE SCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Somchai Chatvichienchai, Mizuho Iwaihara, Yahiko Kambayashi Translating Content-Based Authorizations for XML Documents. Search on Bibsonomy WISE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Authorizations, Role-based Access Control, XML Documents, Schema Transformation, Document Transformation
18Joon S. Park, Junseok Hwang Role-based access control for collaborative enterprise in peer-to-peer computing environments. Search on Bibsonomy SACMAT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, role-based access control, peer-to-peer computing
18Horst F. Wedde, Mario Lischka Cooperative role-based administration. Search on Bibsonomy SACMAT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Petri-Nets, modularity, composability, work-flow
18Wook Shin, Dong-Ik Lee, Hyoung-Chun Kim, Jung-Min Kang, Jin-Seok Lee Extended Role Based Access Control and Procedural Restrictions. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Till Mossakowski, Michael Drouineaud, Karsten Sohr A temporal-logic extension of role-based access control covering dynamic separation of duties. Search on Bibsonomy TIME The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Vishal Kher, Yongdae Kim Decentralized Authentication Mechanisms for Object-based Storage Devices. Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Ramaswamy Chandramouli A Policy Validation Framework for Enterprise Authorization Specification. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Steffen E. Seufert Der Entwurf strukturierter rollenbasierter Zugriffskontrollmodelle, Ein formaler Ansatz zur Ableitung von Zugriffsrechten aus der Aufbauorganisation. Search on Bibsonomy Inform. Forsch. Entwickl. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Zugriffskontrolle, rollenbasierte Zugriffskontrolle, Autorisation, IT-Sicherheit, Sicherheitsstrategie
18Wataru Yamazaki, Fumio Mizoguchi Design and Implementation of Access Control System for Smart Office Environment. Search on Bibsonomy ISSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18Evimaria Terzi, Yuhui Zhong, Bharat K. Bhargava, Pankaj, Sanjay Madria An Algorithm for Building User-Role Profiles in a Trust Environment. Search on Bibsonomy DaWaK The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18Xiaofeng Gong, Julian Newman Selecting a Security Architecture for a New Model of Distributed Tutorial Support. Search on Bibsonomy WETICE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Distributed collaborative computing, Role Based Access Control
18Reinhardt A. Botha, Jan H. P. Eloff Designing Role Hierarchies for Access Control in Workflow Systems. Search on Bibsonomy COMPSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Along Lin A Knowledge-Based Approach to Internet Authorizations. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Matthew J. Moyer, Mustaque Ahamad Generalized Role-Based Access Control. Search on Bibsonomy ICDCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Michael Hitchens, Vijay Varadharajan Tower: A Language for Role Based Access Control. Search on Bibsonomy POLICY The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Dianlong Zhang, Harald Lukhaub, Werner Zorn A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Edward C. Cheng An Object-Oriented Organizational Model to Support Dynamic Role-based Access Control in Electronic Commerce Applications. Search on Bibsonomy HICSS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17Lyuye Zhang, Kaixuan Li, Kairan Sun, Daoyuan Wu, Ye Liu, Haoye Tian, Yang Liu ACFIX: Guiding LLMs with Mined Common RBAC Practices for Context-Aware Repair of Access Control Vulnerabilities in Smart Contracts. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Garsha Rostami Role-based Access Control (RBAC) Authorization in Kubernetes. Search on Bibsonomy J. ICT Stand. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Thomas Baumer, Mathis Müller, Günther Pernul System for Cross-Domain Identity Management (SCIM): Survey and Enhancement With RBAC. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17A. Kousalya, Namkyun Baik Enhance cloud security and effectiveness using improved RSA-based RBAC with XACML technique. Search on Bibsonomy Int. J. Intell. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Divyam Pahuja, Alvin Tang, Klim Tsoutsman Automated SELinux RBAC Policy Verification Using SMT. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Safwa Ameer, James O. Benson, Ravi S. Sandhu Hybrid Approaches (ABAC and RBAC) Toward Secure Access Control in Smart Home IoT. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 1029 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license