|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 936 occurrences of 345 keywords
|
|
|
Results
Found 1029 publication records. Showing 1029 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
24 | Devdatta Kulkarni, Anand Tripathi |
Context-aware role-based access control in pervasive computing systems. |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
context-based access control, pervasive computing, RBAC, context-aware computing |
24 | David Mera, José Manuel Cotos, José Ramon Rios Viqueira, José Varela 0001 |
A User Management Web System Based on Portlets for a Grid Environment Integrating Shibboleth, PURSe, PERMIS and Gridsphere. |
DCAI |
2008 |
DBLP DOI BibTeX RDF |
PERMIS, PURSe, Grid Computing, RBAC, PKI, Portlets, Shibboleth |
24 | Z. Cliffe Schreuders, Christian Payne |
Reusability of Functionality-Based Application Confinement Policy Abstractions. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
Functionality-Based Application Confinement (FBAC), Application-Oriented Access Control, Application Confinement, Reusable Policy, Role-Based Access Control (RBAC), Usable Security, Sandbox |
24 | Anil L. Pereira, Vineela Muppavarapu, Soon M. Chung |
Managing Role-Based Access Control Policies for Grid Databases in OGSA-DAI Using CAS. |
J. Grid Comput. |
2007 |
DBLP DOI BibTeX RDF |
Open Grid Services Architecture - Data Access and Integration (OGSA-DAI), Grid databases, Community Authorization Service (CAS), role-based access control (RBAC), virtual organization (VO) |
24 | Hua Wang 0002, Jinli Cao |
Delegating Revocations and Authorizations. |
Business Process Management Workshops |
2007 |
DBLP DOI BibTeX RDF |
RBAC, Delegation, Revocation |
24 | Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens |
An Integrated Model for Access Control and Information Flow Requirements. |
ASIAN |
2007 |
DBLP DOI BibTeX RDF |
DTE, RBAC, Security Policy, MLS, OrBAC |
24 | Jongil Jeong, Dongil Shin, Dongkyoo Shin |
An XML-Based Security Architecture for Integrating Single Sign-On and Rule-Based Access Control in Mobile and Ubiquitous Web Environments. |
OTM Workshops (2) |
2006 |
DBLP DOI BibTeX RDF |
access control, mobile device, RBAC, XACML, single sign-on, SAML |
24 | Axel Kern, Claudia Walhorn |
Rule support for role-based access control. |
SACMAT |
2005 |
DBLP DOI BibTeX RDF |
SAM Jupiter, automated identity management, directoriescase studies, enterprise role-based access control (ERBAC), provisioning engine, rulesaccess rights, security provisioning, role-based access control (RBAC), rule engine, security administration |
24 | Ramaswamy Chandramouli |
Enterprise access policy enforcement for applications through hybrid models and XSLT technologies. |
ICEC |
2004 |
DBLP DOI BibTeX RDF |
domain type enforcement (DTE), policy rules, role-based access control (RBAC), XML schema, XSLT, provisioning |
24 | Hamdan Dammag, Nimal Nissanke |
A Mathematical Framework for Safecharts. |
ICFEM |
2003 |
DBLP DOI BibTeX RDF |
Step Semantics, Security, Safety, Statecharts, rbac |
24 | Rafael R. Obelheiro, Joni da Silva Fraga |
Role-Based Access Control for CORBA Distributed Object Systems. |
WORDS |
2002 |
DBLP DOI BibTeX RDF |
security, access control, CORBA, RBAC |
24 | John Hale, Mauricio Papa, Oliver Bremer, Rodrigo Chandia, Sujeet Shenoi |
Extending Java for Package based Access Control. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
package based access control, programmable security, TBAC, primitive ticket, language translation preprocessor, security service library, ticket management, Java, object-oriented programming, RBAC, MAC, source code, software libraries, syntax, authorisation, program interpreters, DAC, Java language, bytecode interpretation |
24 | Zhongdong Zhang, Ernst Georg Haffner, Andreas Heuer 0002, Thomas Engel 0001, Christoph Meinel |
Role-based access control in online authoring and publishing systems vs. document hierarchy. |
SIGDOC |
1999 |
DBLP DOI BibTeX RDF |
Web authoring system, document hierarchy, online authoring and publishing, workflow, WEB, RBAC, role-based access control |
18 | Yan Zhu 0010, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang |
Cryptographic role-based security mechanisms based on role-key hierarchy. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
role-based cryptosystem, role-key hierarchy, access control, pairing-based cryptosystem |
18 | Shuliang Zheng, Doingxing Jiang, Qixin Liu |
A Role and Activity Based Access Control Model for University Identity and Access Management System. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde |
A Probabilistic Bound on the Basic Role Mining Problem and Its Applications. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson |
Package-Role Based Authorization Control Model for Wireless Network Services. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Jianfeng Lu, Ruixuan Li 0001, Vijay Varadharajan, Zhengding Lu, Xiaopu Ma |
Secure Interoperation in Multidomain Environments Employing UCON Policies. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Multidomain, cyclic inheritance, interoperation, separation of duty, usage control |
18 | Federica Paci, Rodolfo Ferrini, Yuqing Sun 0001, Elisa Bertino |
Authorization and User Failure Resiliency for WS-BPEL Business Processes. |
ICSOC |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello |
A cost-driven approach to role engineering. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
data mining, role-based access control, role engineering, role mining, cost optimization |
18 | Manabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, Kazumasa Omote, Kouichi Tanimoto, Takashi Horie, Kazuhiko Kato, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi |
Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Maria Luisa Damiani, Claudio Silvestri |
Towards movement-aware access control. |
SPRINGL |
2008 |
DBLP DOI BibTeX RDF |
security, privacy, GIS, geospatial data |
18 | Haoliang Zhai, Gansen Zhao, Lei Li, Jianxiong Huang |
A Role-Based Access Control Model for Complex Affairs. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Paloma Díaz 0001, Ignacio Aedo, Daniel Sanz, Alessio Malizia |
A model-driven approach for the visual specification of Role-Based Access Control policies in web systems. |
VL/HCC |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Tomoya Enokido, Makoto Takizawa 0001 |
Role Based Access Control in Distributed Object Systems. |
ICDCS Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Tomoya Enokido, Makoto Takizawa 0001 |
Synchronization of Transactions to Prevent Illegal Information Flow in a Role-Based Access Control Model. |
AINA |
2008 |
DBLP DOI BibTeX RDF |
Rrole-based access control, Confinement problem, Information Flow |
18 | Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
AmTRUE: Authentication Management and Trusted Role-based Authorization in Multi-Application and Multi-User Environment. |
SECURWARE |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Arnaud Dury, Sergiy Boroday, Alexandre Petrenko, Volkmar Lotz |
Formal Verification of Business Workflows and Role Based Access Control Systems. |
SECURWARE |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Scott D. Stoller, Ping Yang 0002, C. R. Ramakrishnan 0001, Mikhail I. Gofman |
Efficient policy analysis for administrative role based access control. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Yi Zheng, Yongming Chen, Patrick C. K. Hung |
Privacy Access Control Model with Location Constraints for XML Services. |
ICDE Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Lijun Dong, Shengsheng Yu, Kai Ouyang |
The Dynamic Endpoint-Based Access Control Model on VPN. |
IEEE NAS |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Liang Xiao 0002, Andrew Peet, Paul H. Lewis, Srinandan Dashmapatra, Carlos Sáez, Madalina Croitoru, Javier Vicente, Horacio González-Vélez, Magí Lluch i Ariet |
An Adaptive Security Model for Multi-agent Systems and Application to a Clinical Trials Environment. |
COMPSAC (2) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Jung-Hwa Chae, Nematollaah Shiri |
Description Logic Framework for Access Control and Security in Object-Oriented Systems. |
RSFDGrC |
2007 |
DBLP DOI BibTeX RDF |
Role-based access control, description logic, object-oriented system, access control List |
18 | Qun Ni, Alberto Trombetta, Elisa Bertino, Jorge Lobo 0001 |
Privacy-aware role based access control. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
model, privacy, role based access control, purpose |
18 | Indrakshi Ray, Manachai Toahchoodee |
A Spatio-temporal Role-Based Access Control Model. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Kai Ouyang, Xiaowen Chu 0001, Yixin Jiang, Hsiao-Hwa Chen, Jiangchuan Liu |
On the Homonymous Role in Role-Based Discretionary Access Control. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Gansen Zhao, David W. Chadwick, Sassa Otenko |
Obligations for Role Based Access Control. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Hassan Takabi, Morteza Amini, Rasool Jalili |
Trust-Based User-Role Assignment in Role-Based Access Control. |
AICCSA |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Ritesh Kumar Tiwari, Vishal Dwivedi, Kamalakar Karlapalem |
SLA Driven Process Security through Monitored E-contracts. |
IEEE SCC |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Jungin Kim, Bhavani Thuraisingham |
Dependable and Secure TMO Scheme. |
ISORC |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Yanhong A. Liu, Chen Wang, Michael Gorbovitski, Tom Rothamel, Yongxi Cheng, Yingchao Zhao 0001, Jing Zhang |
Core role-based access control: efficient implementations by transformations. |
PEPM |
2006 |
DBLP DOI BibTeX RDF |
complexity guarantees, optimization, access control, transformation, incrementalization |
18 | Indrakshi Ray, Mahendra Kumar, Lijun Yu |
LRBAC: A Location-Aware Role-Based Access Control Model. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Yuping Deng, Xiaowei Guo, Xiamu Niu |
A New Design Scheme of Role-Based Access Control Based on PKI. |
ICICIC (3) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Siqing Du, James B. D. Joshi |
Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy. |
SACMAT |
2006 |
DBLP DOI BibTeX RDF |
multidomain, role based access control, hierarchy, secure interoperation, role mapping |
18 | Sönke Busch, Björn Muschall, Günther Pernul, Torsten Priebe |
Authrule: A Generic Rule-Based Authorization Module. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Steve Barker, Maribel Fernández |
Term Rewriting for Access Control. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Kun Wang, Zhenguo Ding, Lihua Zhou |
Efficient Access Control in Wireless Network. |
IAT Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Hong Zhang, Yeping He, Zhiguo Shi |
Spatial Context in Role-Based Access Control. |
ICISC |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Leon Pan, Chang N. Zhang |
A Criterion-Based Role-Based Multilayer Access Control Model for Multimedia Applications. |
ISM |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Hung Le Xuan, Nguyen Ngoc Diep, Yonil Zhung, Sungyoung Lee, Young-Koo Lee |
A Flexible and Scalable Access Control for Ubiquitous Computing Environments. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Muhammad Alam, Michael Hafner, Ruth Breu |
Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTET. |
PST |
2006 |
DBLP DOI BibTeX RDF |
administrative role based access control, permission-level delegation, service oriented architectures, model-driven architecture |
18 | Jin Wang, Jia Yu 0005, Daxing Li, Xi Bai 0002, Zhongtian Jia |
Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Muhammad Alam, Michael Hafner, Ruth Breu, Stefan Unterthiner |
A Framework for Modeling Restricted Delegation in Service Oriented Architecture. |
TrustBus |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Fan Hong, Yongquan Cui |
Administrative Usage Control Model for Secure Interoperability. |
PDCAT |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Andrea Omicini, Alessandro Ricci, Mirko Viroli |
An algebraic approach for modelling organisation, roles and contexts in MAS. |
Appl. Algebra Eng. Commun. Comput. |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Ying Huang, Santhosh Kumaran, Jen-Yao Chung |
A model-driven framework for enterprise service management. |
Inf. Syst. E Bus. Manag. |
2005 |
DBLP DOI BibTeX RDF |
Enterprise service management, Web services, Service-oriented architecture, Model-driven architecture |
18 | James Joshi, Elisa Bertino, Usman Latif, Arif Ghafoor |
A Generalized Temporal Role-Based Access Control Model. |
IEEE Trans. Knowl. Data Eng. |
2005 |
DBLP DOI BibTeX RDF |
Access control, temporal constraints, separation of duty, role-based, role hierarchy |
18 | Young-Gab Kim, Chang-Joo Moon, Dongwon Jeong, Jeong-Oog Lee, Chee-Yang Song, Doo-Kwon Baik |
Context-Aware Access Control Mechanism for Ubiquitous Applications. |
AWIC |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Secure Role Activation and Authorization in the Enterprise Environment. |
EuroPKI |
2005 |
DBLP DOI BibTeX RDF |
Role Activation, Role Based Access Control, Proxy Signature, Digital Credential |
18 | Robert Steele, Will Tao |
An Architecture for Unifying Web Services Authentication and Authorization. |
ICSOC |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Raman Adaikkalavan, Sharma Chakravarthy |
SmartGate: a smart push-pull approach to support role-based security in web gateways. |
SAC |
2005 |
DBLP DOI BibTeX RDF |
RB security, fire-walls, web gateways, role-based access control |
18 | Qi Li 0002, Jingpu Shi, Sihan Qing |
An Administration Model of DRBAC on the Web. |
ICEBE |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Song-hwa Chae, Wonil Kim, Dong-Kyoo Kim |
Role-Based Access Control Model for Ubiquitous Computing Environment. |
WISA |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Xu Liao, Li Zhang 0065, Stephen Chi-fai Chan |
A Task-Oriented Access Control Model for WfMS. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Suroop Mohan Chandran, James B. D. Joshi |
Towards administration of a hybrid role hierarchy. |
IRI |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Hanbing Yao, Heping Hu, Baohua Huang, Ruixuan Li 0001 |
Dynamic Role and Context-Based Access Control for Grid Applications. |
PDCAT |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Horst F. Wedde, Mario Lischka |
Modular authorization and administration. |
ACM Trans. Inf. Syst. Secur. |
2004 |
DBLP DOI BibTeX RDF |
Petri-Nets, Modularity, composability, work-flow |
18 | Ninghui Li, Ziad Bizri, Mahesh V. Tripunitara |
On mutually-exclusive roles and separation of duty. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
verification, constraints, role-based access control, separation of duty |
18 | Mahesh V. Tripunitara, Ninghui Li |
Comparing the expressive power of access control models. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
augmented typed access matrix, state-matching reduction, typed access matrix, role-based access control, reduction, expressive power, discretionary access control |
18 | HyungHyo Lee, YoungLok Lee, BongNam Noh |
A Framework for Modeling Organization Structure in Role Engineering. |
PARA |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Chiara Braghin, Daniele Gorla, Vladimiro Sassone |
A Distributed Calculus for Ro^le-Based Access Control. |
CSFW |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Xuhui Ao, Naftaly H. Minsky |
On the role of roles: from role-based to role-sensitive access control. |
SACMAT |
2004 |
DBLP DOI BibTeX RDF |
access control policy specification and decentralized enforcement, security, role-based access control, law-governed interaction |
18 | Shengli Sheng, Sylvia L. Osborn |
A Classifier-Based Approach to User-Role Assignment for Web Applications. |
Secure Data Management |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Deholo Nali, Carlisle M. Adams, Ali Miri |
Using Mediated Identity-Based Cryptography to Support Role-Based Access Control. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Chang-Joo Moon, Hoh Peter In |
Inconsistency Detection of Authorization Policies in Distributed Component Environment. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Hua Wang 0002, Yanchun Zhang, Jinli Cao, Jian Yang |
Specifying Role-Based Access Constraints with Object Constraint Language. |
APWeb |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Roosdiana Wonohoesodo, Zahir Tari |
A Role based Access Control for Web Services. |
IEEE SCC |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Somchai Chatvichienchai, Mizuho Iwaihara, Yahiko Kambayashi |
Translating Content-Based Authorizations for XML Documents. |
WISE |
2003 |
DBLP DOI BibTeX RDF |
Authorizations, Role-based Access Control, XML Documents, Schema Transformation, Document Transformation |
18 | Joon S. Park, Junseok Hwang |
Role-based access control for collaborative enterprise in peer-to-peer computing environments. |
SACMAT |
2003 |
DBLP DOI BibTeX RDF |
security, role-based access control, peer-to-peer computing |
18 | Horst F. Wedde, Mario Lischka |
Cooperative role-based administration. |
SACMAT |
2003 |
DBLP DOI BibTeX RDF |
Petri-Nets, modularity, composability, work-flow |
18 | Wook Shin, Dong-Ik Lee, Hyoung-Chun Kim, Jung-Min Kang, Jin-Seok Lee |
Extended Role Based Access Control and Procedural Restrictions. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Till Mossakowski, Michael Drouineaud, Karsten Sohr |
A temporal-logic extension of role-based access control covering dynamic separation of duties. |
TIME |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Vishal Kher, Yongdae Kim |
Decentralized Authentication Mechanisms for Object-based Storage Devices. |
IEEE Security in Storage Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Ramaswamy Chandramouli |
A Policy Validation Framework for Enterprise Authorization Specification. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Steffen E. Seufert |
Der Entwurf strukturierter rollenbasierter Zugriffskontrollmodelle, Ein formaler Ansatz zur Ableitung von Zugriffsrechten aus der Aufbauorganisation. |
Inform. Forsch. Entwickl. |
2002 |
DBLP DOI BibTeX RDF |
Zugriffskontrolle, rollenbasierte Zugriffskontrolle, Autorisation, IT-Sicherheit, Sicherheitsstrategie |
18 | Wataru Yamazaki, Fumio Mizoguchi |
Design and Implementation of Access Control System for Smart Office Environment. |
ISSS |
2002 |
DBLP DOI BibTeX RDF |
|
18 | Evimaria Terzi, Yuhui Zhong, Bharat K. Bhargava, Pankaj, Sanjay Madria |
An Algorithm for Building User-Role Profiles in a Trust Environment. |
DaWaK |
2002 |
DBLP DOI BibTeX RDF |
|
18 | Xiaofeng Gong, Julian Newman |
Selecting a Security Architecture for a New Model of Distributed Tutorial Support. |
WETICE |
2002 |
DBLP DOI BibTeX RDF |
Distributed collaborative computing, Role Based Access Control |
18 | Reinhardt A. Botha, Jan H. P. Eloff |
Designing Role Hierarchies for Access Control in Workflow Systems. |
COMPSAC |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Along Lin |
A Knowledge-Based Approach to Internet Authorizations. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Matthew J. Moyer, Mustaque Ahamad |
Generalized Role-Based Access Control. |
ICDCS |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Michael Hitchens, Vijay Varadharajan |
Tower: A Language for Role Based Access Control. |
POLICY |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Dianlong Zhang, Harald Lukhaub, Werner Zorn |
A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications. |
ICICS |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Edward C. Cheng |
An Object-Oriented Organizational Model to Support Dynamic Role-based Access Control in Electronic Commerce Applications. |
HICSS |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Lyuye Zhang, Kaixuan Li, Kairan Sun, Daoyuan Wu, Ye Liu, Haoye Tian, Yang Liu |
ACFIX: Guiding LLMs with Mined Common RBAC Practices for Context-Aware Repair of Access Control Vulnerabilities in Smart Contracts. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Garsha Rostami |
Role-based Access Control (RBAC) Authorization in Kubernetes. |
J. ICT Stand. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Thomas Baumer, Mathis Müller, Günther Pernul |
System for Cross-Domain Identity Management (SCIM): Survey and Enhancement With RBAC. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
17 | A. Kousalya, Namkyun Baik |
Enhance cloud security and effectiveness using improved RSA-based RBAC with XACML technique. |
Int. J. Intell. Networks |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Divyam Pahuja, Alvin Tang, Klim Tsoutsman |
Automated SELinux RBAC Policy Verification Using SMT. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Safwa Ameer, James O. Benson, Ravi S. Sandhu |
Hybrid Approaches (ABAC and RBAC) Toward Secure Access Control in Smart Home IoT. |
IEEE Trans. Dependable Secur. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #301 - #400 of 1029 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|