Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Ioannis Mavridis |
Deploying Privacy Improved RBAC in Web Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Technol. Syst. Approach ![In: Int. J. Inf. Technol. Syst. Approach 4(2), pp. 70-87, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Padmalochan Bera, Soumya Kanti Ghosh 0001, Pallab Dasgupta |
A WLAN security management framework based on formal spatio-temporal RBAC model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 4(9), pp. 981-993, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | GuangXu Zhou, Rustu Murat Demirer, Coskun Bayrak, Licheng Wang |
Enable delegation for RBAC with Secure Authorization Certificate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 30(8), pp. 780-790, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Mark Strembeck, Jan Mendling |
Modeling process-related RBAC models with extended UML activity models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Softw. Technol. ![In: Inf. Softw. Technol. 53(5), pp. 456-483, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Yuqing Sun 0001, Qihua Wang, Ninghui Li, Elisa Bertino, Mikhail J. Atallah |
On the Complexity of Authorization in RBAC under Qualification and Security Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 8(6), pp. 883-897, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Longying Lian, Chunyu Song |
Research of RBAC access control model based on LDAP tree storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EMEIT ![In: International Conference on Electronic and Mechanical Engineering and Information Technology, EMEIT 2011, Harbin, Heilongjiang, China, 12-14 August, 2011, pp. 1363-1365, 2011, IEEE, 978-1-61284-087-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Muhammad Rizwan Asghar, Giovanni Russello, Bruno Crispo |
Poster: ESPOONERBAC: enforcing security policies in outsourced environments with encrypted RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011, pp. 841-844, 2011, ACM, 978-1-4503-0948-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
17 | Francesco Alberti, Alessandro Armando, Silvio Ranise |
Efficient symbolic automated analysis of administrative attribute-based RBAC-policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, Hong Kong, China, March 22-24, 2011, pp. 165-175, 2011, ACM, 978-1-4503-0564-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Khaled Gaaloul, Erik Proper, François Charoy |
An Extended RBAC Model for Task Delegation in Workflow Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BIR Workshops ![In: Workshops on Business Informatics Research - BIR 2011 International Workshops and Doctoral Consortium, Riga, Latvia, October 6, 2011 Revised Selected Papers, pp. 51-63, 2011, Springer, 978-3-642-29230-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Marko Komlenovic, Mahesh V. Tripunitara, Toufik Zitouni |
An empirical assessment of approaches to distributed enforcement in role-based access control (RBAC). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pp. 121-132, 2011, ACM, 978-1-4503-0466-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Sangsig Kim, Yen-Ting Lee, Yuanlin Zhu, Dae-Kyoo Kim, Lunjin Lu, Vijayan Sugumaran |
A Feature-Based Modeling Approach to Configuring Privacy and Temporality in RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEKE ![In: Proceedings of the 23rd International Conference on Software Engineering & Knowledge Engineering (SEKE'2011), Eden Roc Renaissance, Miami Beach, USA, July 7-9, 2011, pp. 666-671, 2011, Knowledge Systems Institute Graduate School, 1-891706-29-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
17 | Nafees Qamar, Yves Ledru, Akram Idani |
Evaluating RBAC Supported Techniques and their Validation and Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26, 2011, pp. 734-739, 2011, IEEE Computer Society, 978-1-4577-0979-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Maria Leitner, Stefanie Rinderle-Ma, Jürgen Mangler |
AW-RBAC: Access Control in Adaptive Workflow Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26, 2011, pp. 27-34, 2011, IEEE Computer Society, 978-1-4577-0979-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Anne Baumgrass |
Deriving Current State RBAC Models from Event Logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26, 2011, pp. 667-672, 2011, IEEE Computer Society, 978-1-4577-0979-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Nora Cuppens-Boulahia, Frédéric Cuppens, Marie Nuadi |
Smatch Model: Extending RBAC Sessions in Virtualization Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26, 2011, pp. 17-26, 2011, IEEE Computer Society, 978-1-4577-0979-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Nezar Nassr, Eric Steegmans |
A parameterized RBAC access control model for WS-BPEL orchestrated composite web services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 122-127, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
17 | Mirco Kuhlmann, Karsten Sohr, Martin Gogolla |
Comprehensive Two-Level Analysis of Static and Dynamic RBAC Constraints with UML and OCL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea, pp. 108-117, 2011, IEEE Computer Society, 978-0-7695-4453-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Anne Baumgrass, Thomas Baier 0001, Jan Mendling, Mark Strembeck |
Conformance Checking of RBAC Policies in Process-Aware Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Business Process Management Workshops (2) ![In: Business Process Management Workshops - BPM 2011 International Workshops, Clermont-Ferrand, France, August 29, 2011, Revised Selected Papers, Part II, pp. 435-446, 2011, Springer, 978-3-642-28114-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Sigrid Schefer, Mark Strembeck |
Modeling Support for Delegating Roles, Tasks, and Duties in a Process-Related RBAC Context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAiSE Workshops ![In: Advanced Information Systems Engineering Workshops - CAiSE 2011 International Workshops, London, UK, June 20-24, 2011. Proceedings, pp. 660-667, 2011, Springer, 978-3-642-22055-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Anil L. Pereira |
RBAC for High Performance Computing Systems Integration in Grid Computing and Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS Workshops ![In: 25th IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2011, Anchorage, Alaska, USA, 16-20 May 2011 - Workshop Proceedings, pp. 914-921, 2011, IEEE, 978-1-61284-425-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Emmanouil Georgakakis, Stefanos A. Nikolidakis, Dimitrios D. Vergados, Christos Douligeris |
Spatio temporal emergency role based access control (STEM-RBAC): A time and location aware role based access control model with a break the glass mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 16th IEEE Symposium on Computers and Communications, ISCC 2011, Kerkyra, Corfu, Greece, June 28 - July 1, 2011, pp. 764-770, 2011, IEEE Computer Society, 978-1-4577-0680-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Solomon Berhe, Steven A. Demurjian, Swapna S. Gokhale, Jaime A. Pavlich-Mariscal, Rishi Saripalle |
Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model That Extends NIST RBAC. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security and Privacy XXV - 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings, pp. 293-300, 2011, Springer, 978-3-642-22347-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Jang Mook Kang, Jae Sang Cha, You-Jin Song, Goo-Man Park, Eun-Young Ko, Myong-Chul Shin, Jeong Jin Kang, YouSik Hong |
A Scheme for Role-Based 3D CCTV Using CS-RBAC (Context-Sensitivity Role-Based Access Control). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Information Security and Assurance - International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings, pp. 378-383, 2011, Springer, 978-3-642-23140-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Cheng Zhang, Zulong Lai |
An Organization-Extended RBAC Model and Its Application in Workflow System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAIC (2) ![In: Applied Informatics and Communication - International Conference, ICAIC 2011, Xi'an, China, August 20-21, 2011, Proceedings, Part II, pp. 531-537, 2011, Springer, 978-3-642-23219-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Jun Zheng 0007, Yu-an Tan 0001, Qikun Zhang, Chunxiao Gao, Siyuan Wang |
A RBAC Model Based on Multi-granularities of Time Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAIC (4) ![In: Applied Informatics and Communication - International Conference, ICAIC 2011, Xi'an, China, August 20-21, 2011, Proceedings, Part IV, pp. 538-549, 2011, Springer, 978-3-642-23225-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Jinling Liu, Hejiao Huang, Hongwei Du 0001 |
Greedy Algorithm for Least Privilege in RBAC Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COCOA ![In: Combinatorial Optimization and Applications - 5th International Conference, COCOA 2011, Zhangjiajie, China, August 4-6, 2011. Proceedings, pp. 537-545, 2011, Springer, 978-3-642-22615-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Ahmad Kamran Malik, Schahram Dustdar |
Sharing and Privacy-Aware RBAC in Online Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SocialCom/PASSAT ![In: PASSAT/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Conference on Social Computing (SocialCom), Boston, MA, USA, 9-11 Oct., 2011, pp. 1352-1355, 2011, IEEE Computer Society, 978-1-4577-1931-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Carles Martínez-García, Guillermo Navarro-Arribas, Joan Borrell |
Intra-role Progression in RBAC: An RPG-Like Access Control Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DPM/SETOP ![In: Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers, pp. 221-234, 2011, Springer, 978-3-642-28878-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Scibor Sobieski, Bartosz Zielinski 0002 |
Modularisation in Maude of Parametrized RBAC for Row Level Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADBIS ![In: Advances in Databases and Information Systems - 15th International Conference, ADBIS 2011, Vienna, Austria, September 20-23, 2011. Proceedings, pp. 401-414, 2011, Springer, 978-3-642-23736-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Nagajyothi Gunti, Weiqing Sun, Mohammed Y. Niamat |
I-RBAC: Isolation enabled role-based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 79-86, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Christopher Bailey 0003, David W. Chadwick, Rogério de Lemos |
Self-Adaptive Authorization Framework for Policy Based RBAC/ABAC Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASC ![In: IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, DASC 2011, 12-14 December 2011, Sydney, Australia, pp. 37-44, 2011, IEEE Computer Society, 978-0-7695-4612-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Adel Bouhoula |
A delegation model for extended RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 9(3), pp. 209-236, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Chao Huang, Jianling Sun, Xinyu Wang 0001, Di Wu |
Inconsistency Resolution Method for RBAC Based Interoperation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Inf. Syst. ![In: IEICE Trans. Inf. Syst. 93-D(5), pp. 1070-1079, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Wesam Darwish, Konstantin Beznosov |
Analysis of ANSI RBAC Support in COM+. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Stand. Interfaces ![In: Comput. Stand. Interfaces 32(4), pp. 197-214, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Alberto Calvi, Silvio Ranise, Luca Viganò 0001 |
Automated Validation of Security-sensitive Web Services specified in BPEL and RBAC (Extended Version) ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1009.4625, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
17 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde |
Taming role mining complexity in RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 29(5), pp. 548-564, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | He Guo 0001, Guoji Lu, Yuxin Wang, Han Li, Xin Chen 0032 |
RBAC-Based Access Control Integration Framework for Legacy System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISM ![In: Web Information Systems and Mining - International Conference, WISM 2010, Sanya, China, October 23-24, 2010. Proceedings, pp. 194-201, 2010, Springer, 978-3-642-16514-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde |
Mining Business-Relevant RBAC States through Decomposition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings, pp. 19-30, 2010, Springer, 978-3-642-15256-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Leslie Huin, Danielle Boulanger, Eric Disson |
An agent and RBAC model to secure cooperative information systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MEDES ![In: MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, Bangkok, Thailand, October 26-29, 2010, pp. 122-130, 2010, ACM, 978-1-4503-0047-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Christophe Feltus, Eric Dubois 0001, Michaël Petit |
Conceptualizing a responsibility based approach for elaborating and verifying RBAC policies conforming with CobiT framework requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RELAW ![In: Third International Workshop on Requirements Engineering and Law, RELAW 2010, Sydney, NSW, Australia, September 28, 2010, pp. 34-43, 2010, IEEE Computer Society, 978-1-4244-8761-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Laïd Kahloul, Karim Djouani, Walid Tfaili, Allaoua Chaoui, Yacine Amirat |
Modeling and Verification of RBAC Security Policies Using Colored Petri Nets and CPN-Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDT (2) ![In: Networked Digital Technologies - Second International Conference, NDT 2010, Prague, Czech Republic, July 7-9, 2010. Proceedings, Part II, pp. 604-618, 2010, Springer, 978-3-642-14305-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Muhammad Asif Habib |
Mutual exclusion and role inheritance affecting least privilege in RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-6, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
17 | Ravi Kumar 0005, Shamik Sural, Arobinda Gupta |
Mining RBAC Roles under Cardinality Constraint. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings, pp. 171-185, 2010, Springer, 978-3-642-17713-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Mark Slaymaker, David J. Power, Andrew Simpson |
Formalising and Validating RBAC-to-XACML Translation Using Lightweight Formal Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASM ![In: Abstract State Machines, Alloy, B and Z, Second International Conference, ABZ 2010, Orford, QC, Canada, February 22-25, 2010. Proceedings, pp. 349-362, 2010, Springer, 978-3-642-11810-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde |
Evaluating the Risk of Adopting RBAC Roles. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security and Privacy XXIV, 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings, pp. 303-310, 2010, Springer, 978-3-642-13738-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Kyu Il Kim, Wonyoung Kim, Joonsuk Ryu, Hyuk Jin Ko, Ung-Mo Kim, Woo Jun Kang |
RBAC-based access control for privacy preserving in semantic web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUIMC ![In: Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2010, Suwon, Republic of Korea, January 14-15, 2010, pp. 63, 2010, ACM, 978-1-60558-893-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Alberto Calvi, Silvio Ranise, Luca Viganò 0001 |
Automated Validation of Security-Sensitive Web Services Specified in BPEL and RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SYNASC ![In: 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC 2010, Timisoara, Romania, 23-26 September 2010, pp. 456-464, 2010, IEEE Computer Society, 978-0-7695-4324-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Aneta Poniszewska-Maranda |
Platform for Access Control Management in Information System Based on Extended RBAC Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SYNASC ![In: 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC 2010, Timisoara, Romania, 23-26 September 2010, pp. 510-517, 2010, IEEE Computer Society, 978-0-7695-4324-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Jun Luo, Shenghua Xu |
Based on RBAC Security Design of University Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEE ![In: The International Conference on E-Business and E-Government, ICEE 2010, 7-9 May 2010, Guangzhou, China, Proceedings, pp. 1779-1782, 2010, IEEE Computer Society, 978-0-7695-3997-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Bokman Jang, Sungdo Park, Hyokyung Chang, Hyosik Ahn, Eui-In Choi |
A Study of Context-Awareness RBAC Model Using User Profile on Ubiquitous Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGIT-FGCN (2) ![In: Communication and Networking - International Conference, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings, Part II, pp. 205-213, 2010, Springer, 978-3-642-17603-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Yong-Zhong He, Zhan Han, Ying Cai |
A Fine Grained RBAC Model Supporting Flexible Administrative Separation of Duty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings, pp. 192-195, 2010, IEEE Computer Society, 978-1-4244-8378-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
administrative Separation of Duty, prerequisite role, fine-grained |
17 | Jaisankar Narayanasamy, Sankaradass Veeramalai, Arputharaj Kannan |
Team Automata Based Framework for Spatio-Temporal RBAC Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BAIP ![In: Information Processing and Management - International Conference on Recent Trends in Business Administration and Information Processing, BAIP 2010, Trivandrum, Kerala, India, March 26-27, 2010. Proceedings, pp. 586-591, 2010, Springer, 978-3-642-12213-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Wei Su, Guangzhou Zeng |
A RBAC model considering the user reliability in workflow system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 3rd International Conference on Information Sciences and Interaction Sciences (ICIS 2010), Chengdu, China, June 23-25, 2010, pp. 426-430, 2010, IEEE, 978-1-4244-7386-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Xuebin Chen, Shufen Zhang, Dianchuan Jin |
The applications and research of RBAC in Network Collaborative Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 3rd International Conference on Information Sciences and Interaction Sciences (ICIS 2010), Chengdu, China, June 23-25, 2010, pp. 280-284, 2010, IEEE, 978-1-4244-7386-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Zhuo Tang, Rong Guan, Kenli Li 0001 |
User Authorization Queries in RBAC systems based on DNA computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BIC-TA ![In: Fifth International Conference on Bio-Inspired Computing: Theories and Applications, BIC-TA 2010, University of Hunan, Liverpool Hope University, Liverpool, United Kingdom / Changsha, China, September 8-10 and September 23-26, 2010, pp. 174-179, 2010, IEEE, 978-1-4244-6437-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Chuan-Lun Ren, Xiao-Hui Zuo, Zhong-Xian Li, Xinxin Niu, Yixian Yang |
Towards Hierarchical-User RBAC model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMLC ![In: International Conference on Machine Learning and Cybernetics, ICMLC 2010, Qingdao, China, July 11-14, 2010, Proceedings, pp. 2870-2874, 2010, IEEE. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Hemanth Khambhammettu |
Enforcing complex policies in RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2010 |
RDF |
|
17 | Yue Zhang 0002, James B. D. Joshi |
Administration Model for RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Database Systems ![In: Encyclopedia of Database Systems, pp. 58, 2009, Springer US, 978-0-387-35544-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Yue Zhang 0002, James B. D. Joshi |
ANSI/INCITS RBAC Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Database Systems ![In: Encyclopedia of Database Systems, pp. 91-92, 2009, Springer US, 978-0-387-35544-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Yue Zhang 0002, James B. D. Joshi |
GEO-RBAC Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Database Systems ![In: Encyclopedia of Database Systems, pp. 1244-1245, 2009, Springer US, 978-0-387-35544-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | |
RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Database Systems ![In: Encyclopedia of Database Systems, pp. 2339, 2009, Springer US, 978-0-387-35544-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Ebru Celikel, Murat Kantarcioglu, Bhavani Thuraisingham, Elisa Bertino |
A risk management approach to RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Risk Decis. Anal. ![In: Risk Decis. Anal. 1(1), pp. 21-33, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Jörg R. Mühlbacher, Christian Praher |
DS RBAC - Dynamic Sessions in Role Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Univers. Comput. Sci. ![In: J. Univers. Comput. Sci. 15(3), pp. 538-554, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | G. Geethakumari, Atul Negi, V. N. Sastry |
A Cross - Domain Role Mapping and Authorization Framework for RBAC in Grid Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Sci. Appl. ![In: Int. J. Comput. Sci. Appl. 6(1), pp. 1-12, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
17 | Deqing Zou, Ligang He, Hai Jin 0001, Xueguang Chen |
CRBAC: Imposing multi-grained constraints on the RBAC model in the multi-application environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Comput. Appl. ![In: J. Netw. Comput. Appl. 32(2), pp. 402-411, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Qi Li 0002, Xinwen Zhang, Mingwei Xu, Jianping Wu |
Towards secure dynamic collaborations with group-based RBAC model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 28(5), pp. 260-275, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Deqing Zou, Jong Hyuk Park, Tai-Hoon Kim, Xueguang Chen |
SH-CRBAC: Integrating Attribute and Status Constraints into the RBAC Model in Smart Home Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 52(8), pp. 861-870, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Li Pan, Jorge Lobo 0001, Seraphin B. Calo |
Extending the CIM-SPL policy language with RBAC for distributed management systems in the WBEM infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Integrated Network Management ![In: Integrated Network Management, IM 2009. 11th IFIP/IEEE International Symposium on Integrated Network Management, Hofstra University, Long Island, NY, USA, June 1-5, 2009, pp. 145-148, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Bernardo Nugroho Yahya, Hyerim Bae |
Adaptive RBAC in Complex Event-Driven BPM Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LDIC ![In: Dynamics in Logistics, Second International Conference, LDIC 2009, Bremen, Germany, August 17-21, 2009, Proceedings., pp. 203-212, 2009, Springer, 978-3-642-11995-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Muhammad Asif Habib, Christian Praher |
Object based dynamic separation of duty in RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, ICITST 2009, London, UK, November 9-12, 2009, pp. 1-5, 2009, IEEE, 978-1-4244-5648-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Zi Zhang, Ting-lei Huang 0001 |
An Improved RBAC Model and its Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WGEC ![In: 2009 Third International Conference on Genetic and Evolutionary Computing, WGEC 2009, Guilin, China, 14-17 October 2009, pp. 735-737, 2009, IEEE Computer Society, 978-0-7695-3899-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Xiyuan Chen, Miaoliang Zhu |
A Directed Acyclic Graph based Detection for RBAC Based Secure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MASS ![In: IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, MASS 2009, 12-15 October 2009, Macau (S.A.R.), China, pp. 759-764, 2009, IEEE Computer Society, 978-1-4244-5113-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Jason Crampton, Hemanth Khambhammettu |
A Framework for Enforcing Constrained RBAC Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 195-200, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Jia Tian, He Guo 0001, Yuxin Wang, Zheng Wang |
A Fuzzy RBAC Model Described by XML-Graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ScalCom-EmbeddedCom ![In: International Conference on Scalable Computing and Communications / Eighth International Conference on Embedded Computing, ScalCom-EmbeddedCom 2009, Dalian, China, September 25-27, 2009, pp. 154-159, 2009, IEEE Computer Society, 978-0-7695-3825-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Min Xu, Duminda Wijesekera, Xinwen Zhang, Deshan Cooray |
Towards Session-Aware RBAC Administration and Enforcement with XACML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2009, IEEE International Symposium on Policies for Distributed Systems and Networks, London, UK, 20-22 July 2009, pp. 9-16, 2009, IEEE Computer Society, 978-0-7695-3742-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Dejun Chen, Zude Zhou, Yingzhe Ma, D. T. Pham |
Modeling of RBAC-based access control of virtual enterprise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Kybernetes ![In: Kybernetes 37(9/10), pp. 1242-1249, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Xinyu Wang 0001, Jianling Sun, Xiaohu Yang 0001, Chao Huang, Di Wu |
Security Violation Detection for RBAC Based Interoperation in Distributed Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Inf. Syst. ![In: IEICE Trans. Inf. Syst. 91-D(5), pp. 1447-1456, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Tanveer Mustafa, Karsten Sohr, Duc-Hanh Dang, Michael Drouineaud, Stefan Kowski |
Implementing Advanced RBAC Administration Functionality with USE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Commun. Eur. Assoc. Softw. Sci. Technol. ![In: Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 15, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, James Riely |
Lambda-RBAC: Programming with Role-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Log. Methods Comput. Sci. ![In: Log. Methods Comput. Sci. 4(1), 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Ioannis Mavridis, Andreas K. Mattas, Ioannis Pagkalos, Isabella Kotini, Christos Ilioudis |
Supporting dynamic administration of RBAC in web-based collaborative applications during run-time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Comput. Secur. ![In: Int. J. Inf. Comput. Secur. 2(4), pp. 328-352, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Wei Zhou 0006, Christoph Meinel |
Enforcing Information Flow Constraints in RBAC Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 159-164, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Ali E. Abdallah, Hassan Takabi |
Integrating Delegation with the Formal Core RBAC Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proccedings of the Fourth International Conference on Information Assurance and Security, IAS 2008, September 8-10, 2008, Napoli, Italy, pp. 33-36, 2008, IEEE Computer Society, 978-0-7695-3324-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Lionel Habib, Mathieu Jaume, Charles Morisset |
A Formal Comparison of the Bell & LaPadula and RBAC Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proccedings of the Fourth International Conference on Information Assurance and Security, IAS 2008, September 8-10, 2008, Napoli, Italy, pp. 3-8, 2008, IEEE Computer Society, 978-0-7695-3324-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Samrat Mondal, Shamik Sural |
Security Analysis of Temporal-RBAC Using Timed Automata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proccedings of the Fourth International Conference on Information Assurance and Security, IAS 2008, September 8-10, 2008, Napoli, Italy, pp. 37-40, 2008, IEEE Computer Society, 978-0-7695-3324-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Min Li, Hua Wang 0002 |
ABDM: An extended flexible delegation model in RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Proceedings of 8th IEEE International Conference on Computer and Information Technology, CIT 2008, Sydney, Australia, July 8-11, 2008, pp. 390-395, 2008, IEEE Computer Society, 978-1-4244-2357-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Le Yang 0003, Yongsun Choi, Myeonggil Choi, Xinlei Zhao |
FWAM: A flexible workflow authorization model using extended RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD ![In: Proceedings of the 12th International Conference on CSCW in Design, CSCWD 2008, April 16-18, 2008, Nanyang Hotel, Xi'an Jiaotong University, Xi'an, China, pp. 625-629, 2008, IEEE, 978-1-4244-1650-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Dongwon Jeong, Hyejin Jeong, Young-Sik Jeong |
SS-RBAC: Secure Query Processing Model for Semantic Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (2) ![In: The Second International Conference on Future Generation Communication and Networking, FGCN 2008, Volume 2, Workshops, Hainan Island, China, December 13-15, 2008, pp. 352-355, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Martin Knechtel, Jan Hladik, Frithjof Dau |
Using OWL DL Reasoning to Decide about authorization in RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OWLED ![In: Proceedings of the Fifth OWLED Workshop on OWL: Experiences and Directions, collocated with the 7th International Semantic Web Conference (ISWC-2008), Karlsruhe, Germany, October 26-27, 2008, 2008, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
17 | Sekpon Juntapremjitt, Somchart Fugkeaw, Piyawit Manpanpanich |
An SSO-Capable Distributed RBAC Model with High Availability across Administrative Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops ![In: 22nd International Conference on Advanced Information Networking and Applications, AINA 2008, Workshops Proceedings, GinoWan, Okinawa, Japan, March 25-28, 2008, pp. 121-126, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Zhu Tang, Shiguang Ju, Weihe Chen |
Active Authorization Rules for Enforcing RBAC with Spatial Characteristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCSCT (2) ![In: 2008 International Symposium on Computer Science and Computational Technology, ISCSCT 2008, 20-22 December 2008, Shanghai, China, 2 Volumes, pp. 632-636, 2008, IEEE Computer Society, 978-0-7695-3498-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Jian-min Han, Xi-yu Li, Huiqun Yu, Jun Tong |
An Extended RBAC Model based on Granular Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GrC ![In: The 2008 IEEE International Conference on Granular Computing, GrC 2008, Hangzhou, China, 26-28 August 2008, pp. 261-264, 2008, IEEE, 978-1-4244-2512-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Mirko Viroli, Andrea Omicini, Alessandro Ricci |
Infrastructure for RBAC-MAS: An Approach Based on Agent Coordination Contexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Artif. Intell. ![In: Appl. Artif. Intell. 21(4&5), pp. 443-467, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, James Riely |
Lambda-RBAC: Programming with Role-Based Access Control ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0712.1205, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
17 | JuHum Kwon, Chang-Joo Moon |
Visual modeling and formal specification of constraints of RBAC using semantic web technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Knowl. Based Syst. ![In: Knowl. Based Syst. 20(4), pp. 350-356, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Bhavani Thuraisingham, Murat Kantarcioglu, Srinivasan Iyer 0003 |
Extended RBAC-based design and implementation for a secure data warehouse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Bus. Intell. Data Min. ![In: Int. J. Bus. Intell. Data Min. 2(4), pp. 367-382, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Jacques Wainer, Akhil Kumar 0001, Paulo Barthelmess |
DW-RBAC: A formal security model of delegation and revocation in workflow systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. ![In: Inf. Syst. 32(3), pp. 365-384, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Maria Luisa Damiani, Elisa Bertino, Paolo Perlasca |
Data security in location-aware applications: an approach based on RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Comput. Secur. ![In: Int. J. Inf. Comput. Secur. 1(1/2), pp. 5-38, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Weiqiang Kong, Kazuhiro Ogata 0001, Kokichi Futatsugi |
Specification and Verification of Workflows with Rbac Mechanism and Sod Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Softw. Eng. Knowl. Eng. ![In: Int. J. Softw. Eng. Knowl. Eng. 17(1), pp. 3-32, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Le Yang 0003, Yongsun Choi |
A Flexible Access Control Model for Dynamic Workflow Using Extended WAM and RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD (Selected Papers) ![In: Computer Supported Cooperative Work in Design IV, 11th International Conference, CSCWD 2007, Melbourne, Australia, April 26-28, 2007. Revised Selected Papers, pp. 488-497, 2007, Springer, 978-3-540-92718-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Workflow Authorization Model, Role-based Access Control, Workflow System |
17 | Gail-Joon Ahn, Hongxin Hu |
Towards realizing a formal RBAC model in real systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 215-224, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
access control, code generation, model validation, policy specification |