The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for rbac with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1995 (22) 1996-1997 (21) 1998-1999 (43) 2000 (22) 2001 (28) 2002 (35) 2003 (56) 2004 (58) 2005 (80) 2006 (90) 2007 (103) 2008 (105) 2009 (74) 2010 (45) 2011 (39) 2012 (31) 2013 (32) 2014 (24) 2015 (21) 2016 (21) 2017-2018 (25) 2019 (21) 2020-2021 (19) 2022-2024 (14)
Publication types (Num. hits)
article(179) incollection(11) inproceedings(830) phdthesis(4) proceedings(5)
Venues (Conferences, Journals, ...)
SACMAT(83) ACM Workshop on Role-Based Acc...(82) DBSec(23) ACM Trans. Inf. Syst. Secur.(18) ACSAC(15) ARES(15) WETICE(15) CoRR(11) POLICY(11) Comput. Secur.(9) IAS(9) ICISS(9) SAC(9) AsiaCCS(8) CCS(8) CSCWD(7) More (+10 of total 455)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 936 occurrences of 345 keywords

Results
Found 1029 publication records. Showing 1029 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Nasser Al-Hadhrami, Benjamin Aziz, Shantanu Sardesai, Lotfi Ben Othmane Incremental Development of RBAC-Controlled E-Marking System Using the B Method. Search on Bibsonomy ARES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Faouzi Jaïdi, Faten Labbene Ayachi A Risk Awareness Approach for Monitoring the Compliance of RBAC-based Policies. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Longhua Guo, Jianhua Li 0001, Jun Wu 0001, Zhengmin Xia, Shengjun Zheng A Security Mechanism for Demand Response Using RBAC and Pub/sub. Search on Bibsonomy ISADS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Li Lin 0008, Jian Ni, Jian Hu, Jian-biao Zhang RbacIP: A RBAC-Based Method for Intercepting and Processing Malicious Applications in Android Platform. Search on Bibsonomy INTRUST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Hsing-Chung Chen A Hierarchical Virtual Role Assignment for Negotiation-Based RBAC Scheme. Search on Bibsonomy BWCCA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Emre Uzun, David Lorenzi, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural Migrating from DAC to RBAC. Search on Bibsonomy DBSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Rishi Kanth Saripalle, Alberto De la Rosa Algarin, Timoteus B. Ziminski Towards knowledge level privacy and security using RDF/RDFS and RBAC. Search on Bibsonomy ICSC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Faouzi Jaïdi, Faten Labbene Ayachi The problem of integrity in RBAC-based policies within relational databases: synthesis and problem study. Search on Bibsonomy IMCOM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Stefano Calzavara, Alvise Rabitti, Michele Bugliesi Formal Verification of Liferay RBAC. Search on Bibsonomy ESSoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Lars Hamann, Karsten Sohr, Martin Gogolla Monitoring Database Access Constraints with an RBAC Metamodel: A Feasibility Study. Search on Bibsonomy ESSoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Christophe Feltus, Eric Dubois 0001, Michaël Petit Alignment of ReMMo with RBAC to manage access rights in the frame of enterprise architecture. Search on Bibsonomy RCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Tran Khanh Dang, Kim Tuyen Le Thi, Anh Tuan Dang, Ha Duc Son Van Towards a flexible framework to support a generalized extension of XACML for spatio-temporal RBAC model with reasoning ability. Search on Bibsonomy Int. J. Web Inf. Syst. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Jianfeng Lu 0002, Dewu Xu, Lei Jin 0003, Jianmin Han, Hao Peng 0002 On the complexity of role updating feasibility problem in RBAC. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Dong Hwi Lee, Byunghun Kim, Kuinam J. Kim PCA in ERP environment using the misuse detection system design and implementation of RBAC permissions. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Guowei Wang, Guangming Xu, Manjun Xue Unified Identity Authentication between Heterogeneous Systems Based on LDAP and RBAC. Search on Bibsonomy J. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Johannes Prescher, Siegfried Schefer-Wenzl, Anne Baumgrass, Mark Strembeck, Jan Mendling Towards a Comprehensive Complexity Assessment of RBAC Models. Search on Bibsonomy EMISA Forum The full citation details ... 2014 DBLP  BibTeX  RDF
17Ruhi Gupta Implementation of an efficient RBAC in Cloud Computing using .NET environment. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
17Aditi Gupta 0002, Michael S. Kirkpatrick, Elisa Bertino A formal proximity model for RBAC systems. Search on Bibsonomy Comput. Secur. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Sadhana Jha, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri Security analysis of temporal RBAC under an administrative model. Search on Bibsonomy Comput. Secur. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Akram Idani, Yves Ledru, Amira Radhouani Modélisation graphique et validation formelle de politiques RBAC en systèmes d'information. Plateforme B4MSecure. Search on Bibsonomy Ingénierie des Systèmes d Inf. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Sangsig Kim, Dae-Kyoo Kim, Lunjin Lu, Eunjee Song Building hybrid access control by configuring RBAC and MAC features. Search on Bibsonomy Inf. Softw. Technol. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Sigrid Schefer-Wenzl, Mark Strembeck Model-driven specification and enforcement of RBAC break-glass policies for process-aware information systems. Search on Bibsonomy Inf. Softw. Technol. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Wei Zhang 0005, Jingxin Zhu, Dongning Liu, Shaohua Teng, Haibin Zhu RBAC role-permission assignment with conflicting constraints based on the E-CARGO model. Search on Bibsonomy ICCI*CC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Philipp Marcus, Lorenz Schauer, Claudia Linnhoff-Popien Location-Aware RBAC Based on Spatial Feature Models and Realistic Positioning. Search on Bibsonomy CRiSIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Óscar Mortágua Pereira, Diogo Domingues Regateiro, Rui L. Aguiar Extending RBAC Model to Control Sequences of CRUD Expressions. Search on Bibsonomy SEKE The full citation details ... 2014 DBLP  BibTeX  RDF
17Julien Lacroix, Omar Boucelma Trusting the Cloud: A PROV + RBAC Approach. Search on Bibsonomy IEEE CLOUD The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Danfeng Yan, Junlin Huang, Yuan Tian, Yao Zhao 0004, Fangchun Yang Policy Conflict Detection in Composite Web Services with RBAC. Search on Bibsonomy ICWS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Sadhana Jha, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri Temporal RBAC Security Analysis Using Logic Programming in the Presence of Administrative Policies. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Arindam Roy, Shamik Sural, Arun Kumar Majumdar Impact of Multiple t-t SMER Constraints on Minimum User Requirement in RBAC. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Maria Leitner, Stefanie Rinderle-Ma Anomaly detection and visualization in generative RBAC models. Search on Bibsonomy SACMAT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Nathalie Baracaldo, Balaji Palanisamy, James B. D. Joshi Geo-Social-RBAC: A Location-Based Socially Aware Access Control Framework. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Nghi Huynh, Marc Frappier, Amel Mammar, Régine Laleau, Jules Desharnais Validating the RBAC ANSI 2012 Standard Using B. Search on Bibsonomy ABZ The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Ta Chih Yang, Ming-Huang Guo An A-RBAC mechanism for a multi-tenancy cloud environment. Search on Bibsonomy VITAE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Gvoqing Lu, Lingling Zhao, Kuihe Yang The design of the secure transmission and authorization management system based on RBAC. Search on Bibsonomy ICMLC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Frédéric Cuppens, Nora Cuppens-Boulahia, Meriam Ben-Ghorbel-Talbi, Stephane Morucci, Nada Essaouini Smatch: Formal dynamic session management model for RBAC. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Zan Yang, Jianxin Wang, Lin Yang, Rui-guang Yang, Bao-sheng Kou, Jie-kun Chen, Shu-Mei Yang The RBAC model and implementation architecture in multi-domain environment. Search on Bibsonomy Electron. Commer. Res. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Ousmane Amadou Dia, Csilla Farkas Business Driven User Role Assignment: Nimble Adaptation of RBAC to Organizational Changes. Search on Bibsonomy Int. J. Inf. Secur. Priv. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Ed Coyne, Timothy R. Weil ABAC and RBAC: Scalable, Flexible, and Auditable Access Management. Search on Bibsonomy IT Prof. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Hsing-Chung Chen, Marsha Anjanette Violetta, Cheng-Ying Yang Contract RBAC in cloud computing. Search on Bibsonomy J. Supercomput. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Sylvia L. Osborn, He Wang 0020 A Survey of Delegation from an RBAC Perspective. Search on Bibsonomy J. Softw. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Hsing-Chung Chen, Marsha Anjanette Violetta, Chien-Erh Weng, Tzu-Liang Kung Cognitive RBAC in mobile heterogeneous networks. Search on Bibsonomy Comput. Sci. Inf. Syst. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Sigrid Schefer-Wenzl, Mark Strembeck Modelling context-aware RBAC models for mobile business processes. Search on Bibsonomy Int. J. Wirel. Mob. Comput. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Zhenwu Wang, Xuejun Zhao, Benting Wan, Jun Xie, Pengfei Bai A Workflow-based RBAC Model for Web Services in Multiple Autonomous Domains. Search on Bibsonomy J. Networks The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Muhammad Umar Aftab, Amna Nisar, Asif, Adeel Ashraf, Burhan Gill RBAC Architecture Design Issues in Institutions Collaborative Environment. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
17Devrim Unal, M. Ufuk Çaglayan XFPM-RBAC: XML-based specification language for security policies in multidomain mobile networks. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Yan Zhu 0010, Gail-Joon Ahn, Hongxin Hu, Di Ma, Shan-Biao Wang Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Anna Lisa Ferrara, Georg Fuchsbauer, Bogdan Warinschi Cryptographically Enforced RBAC. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
17Hsing-Chung Chen, Marsha Anjanette Violetta A cognitive RBAC model with handover functions in small heterogeneous networks. Search on Bibsonomy Math. Comput. Model. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Zan Yang, Lin Yang, Xiangyang Luo, Linru Ma, Bao-sheng Kou, Kun Zhang Model of Domain based RBAC and Supporting Technologies. Search on Bibsonomy J. Comput. The full citation details ... 2013 DBLP  BibTeX  RDF
17Sigrid Schefer-Wenzl, Mark Strembeck Generic support for RBAC break-glass policies in process-aware information systems. Search on Bibsonomy SAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Anna Lisa Ferrara, Georg Fuchsbauer, Bogdan Warinschi Cryptographically Enforced RBAC. Search on Bibsonomy CSF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Wei Zhang, Zuoquan Lin Representation and Reasoning on RBAC: A Nonmonotonic Approach. Search on Bibsonomy KSEM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Antonios Gouglidis, Ioannis Mavridis, Vincent C. Hu Verification of Secure Inter-operation Properties in Multi-domain RBAC Systems. Search on Bibsonomy SERE (Companion) The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Cátia Santos-Pereira, Alexandre B. Augusto, Ricardo João Cruz Correia, Manuel Eduardo Correia A secure RBAC mobile agent access control model for healthcare institutions. Search on Bibsonomy CBMS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Piero A. Bonatti, Clemente Galdi, Davide Torres ERBAC: event-driven RBAC. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Cátia Santos-Pereira, Alexandre B. Augusto, Ricardo João Cruz Correia, Manuel Eduardo Correia A Secure RBAC Mobile Agent Model for Healthcare Institutions - Preliminary Study. Search on Bibsonomy ITBAM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan, Nazia Badar Towards User-Oriented RBAC Model. Search on Bibsonomy DBSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Yang Luo, Yazhuo Li, Qing Tang, Zhao Wei, Chunhe Xia VRBAC: An Extended RBAC Model for Virtualized Environment and Its Conflict Checking Approach. Search on Bibsonomy ICoC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Wenkang Wu, Zhuo Tang, Renfa Li On the Complexity of Authorization of Temporal RBAC in Cloud Computing Service. Search on Bibsonomy TrustCom/ISPA/IUCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Tuan Ngoc Nguyen, Kim Tuyen Le Thi, Anh Tuan Dang, Ha Duc Son Van, Tran Khanh Dang Towards a Flexible Framework to Support a Generalized Extension of XACML for Spatio-temporal RBAC Model with Reasoning Ability. Search on Bibsonomy ICCSA (5) The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Yu Ye, Cungang Yang Privacy protection for RBAC in service oriented architecture. Search on Bibsonomy CCECE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Bo Tang, Qi Li 0002, Ravi S. Sandhu A multi-tenant RBAC model for collaborative cloud services. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Ting Wu, Tianliang Yuan, Long Yu Hierarchical RBAC Model with Alpha Factor in the Water Supply Pipeline Network Information System. Search on Bibsonomy GreenCom/iThings/CPScom The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Mikko Kiviharju Cryptographic Roles in the Age of Wikileaks: Implementation Models for Cryptographically Enforced RBAC. Search on Bibsonomy MILCOM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Vladimir A. Oleshchuk A novel scheme for privacy preserving in RBAC. Search on Bibsonomy IDAACS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Rinardi B. Sarean, Albert B. Jeng, Hahn-Ming Lee Larbac: enforcement of location constraints for location-aware RBAC system in mobile environment. Search on Bibsonomy ICMLC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Lijun Dong, Xiaojun Kang, Maocai Wang How to Find a Rigorous Set of Roles for Application of RBAC. Search on Bibsonomy J. Softw. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Su Yu, Jon Brewster Formal Specification and Impementation of RBAC Model with SOD. Search on Bibsonomy J. Softw. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Ji Ma A Formal Approach for Risk Assessment in RBAC Systems. Search on Bibsonomy J. Univers. Comput. Sci. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Hsing-Chung Chen, Yung-Fa Huang, Shu-Hong Lee, Chi-Tung Chen, Ho-Lung Hung A mobile location-based with time-constraint RBAC associated database management model. Search on Bibsonomy Comput. Syst. Sci. Eng. The full citation details ... 2012 DBLP  BibTeX  RDF
17Hung-Chang Lee, Shih-Hsin Chang RBAC-Matrix-Based EMR Right Management System to Improve HIPAA Compliance. Search on Bibsonomy J. Medical Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Michael S. Kirkpatrick, Gabriel Ghinita, Elisa Bertino Privacy-Preserving Enforcement of Spatially Aware RBAC. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Jianfeng Lu 0002, Jianmin Han, Wei Chen, Jinwei Hu Safety and Availability Checking for User Authorization Queries in RBAC. Search on Bibsonomy Int. J. Comput. Intell. Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Aneta Poniszewska-Maranda Access Control Management Using Extended RBAC Model. Search on Bibsonomy Towards Modern Collaborative Knowledge Sharing Systems The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Alessandro Armando, Silvio Ranise, Fatih Turkmen, Bruno Crispo Efficient run-time solving of RBAC user authorization queries: pushing the envelope. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Wei Li 0025, Haishan Wan, Xunyi Ren, Sheng Li A Refined RBAC Model for Cloud Computing. Search on Bibsonomy ACIS-ICIS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, Marco Squarcina Gran: Model Checking Grsecurity RBAC Policies. Search on Bibsonomy CSF The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Sigrid Schefer-Wenzl, Mark Strembeck Modeling Context-Aware RBAC Models for Business Processes in Ubiquitous Computing Environments. Search on Bibsonomy MUSIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu Risk-Aware RBAC Sessions. Search on Bibsonomy ICISS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Zhuo Tang, Juan Wei, Ahmed Sallam, Kenli Li 0001, Ruixuan Li 0001 A New RBAC Based Access Control Model for Cloud Computing. Search on Bibsonomy GPC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Anne Baumgrass, Sigrid Schefer-Wenzl, Mark Strembeck Deriving Process-Related RBAC Models from Process Execution Histories. Search on Bibsonomy COMPSAC Workshops The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Satyajeet Raje, Chowdary Davuluri, Michael A. Freitas, Rajiv Ramnath, Jay Ramanathan Using Semantic Web Technologies for RBAC in Project-Oriented Environments. Search on Bibsonomy COMPSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Hejiao Huang, Feng Shang, Jiangtao Zhang Approximation Algorithms for Minimizing the Number of Roles and Administrative Assignments in RBAC. Search on Bibsonomy COMPSAC Workshops The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Maria Leitner, Anne Baumgrass, Sigrid Schefer-Wenzl, Stefanie Rinderle-Ma, Mark Strembeck A Case Study on the Suitability of Process Mining to Produce Current-State RBAC Models. Search on Bibsonomy Business Process Management Workshops The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Peng Yu, Zhengtao Jiang, Wenlong Fu An Object-oriented Fine-grained RBAC Model. Search on Bibsonomy CSO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Suresh Chari, Jorge Lobo 0001, Ian M. Molloy Practical risk aggregation in RBAC models. Search on Bibsonomy SACMAT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Nathalie Baracaldo, James Joshi A trust-and-risk aware RBAC framework: tackling insider threat. Search on Bibsonomy SACMAT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Nima Mousavi, Mahesh V. Tripunitara Mitigating the Intractability of the User Authorization Query Problem in Role-Based Access Control (RBAC). Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Xin Jin, Ram Krishnan, Ravi S. Sandhu A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC. Search on Bibsonomy DBSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Nezar Nassr, Nidal Aboudagga, Eric Steegmans OSDM: An Organizational Supervised Delegation Model for RBAC. Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Wei Zhang, Zuoquan Lin A Logic-Based RBAC Framework for Flexible Policies. Search on Bibsonomy SKG The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Hsing-Chung Chen, Marsha Anjanette Violetta Cognitive RBAC in Small Heterogeneous Networks. Search on Bibsonomy IMIS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Stephane Morucci Towards Session-Aware RBAC Delegation: Function Switch. Search on Bibsonomy DPM/SETOP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Aditi Gupta 0002, Michael S. Kirkpatrick, Elisa Bertino A formal proximity model for RBAC systems. Search on Bibsonomy CollaborateCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Que Nguyet Tran Thi, Tran Khanh Dang X-STROWL: A generalized extension of XACML for context-aware spatio-temporal RBAC model with OWL. Search on Bibsonomy ICDIM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Vladimir A. Oleshchuk Trust-Aware RBAC. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17 RBAC. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Wesam Darwish, Konstantin Beznosov Analysis of ANSI RBAC Support in EJB. Search on Bibsonomy Int. J. Secur. Softw. Eng. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Qiang Wei, Jason Crampton, Konstantin Beznosov, Matei Ripeanu Authorization recycling in hierarchical RBAC systems. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Min Xu, Duminda Wijesekera, Xinwen Zhang Runtime Administration of an RBAC Profile for XACML. Search on Bibsonomy IEEE Trans. Serv. Comput. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 1029 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license