Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Zhenxing Luo, NuerMaimaiti Heilili, Zuoquan Lin |
A Flexible Applicable RBAC Model and Its Administration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 3-7 September 2007, Regensburg, Germany, pp. 192-196, 2007, IEEE Computer Society, 0-7695-2932-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Weiqun Sun, Yanbo Han, Baohua Shan |
A Dynamic Reconciliation Service of RBAC Policies for Virtual Organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEBE ![In: Proceedings of ICEBE 2007, IEEE International Conference on e-Business Engineering and the Workshops SOAIC 2007, SOSE 2007, SOKM 2007, 24-26 October, 2007, Hong Kong, China, pp. 589-595, 2007, IEEE Computer Society, 0-7695-3003-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Yue Zhang 0002, James B. D. Joshi |
A request-driven secure interoperation framework in loosely-coupled multi-domain environments employing RBAC policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Proceedings of the 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing, White Plains, New York, USA, November 12-15, 2007, pp. 25-32, 2007, IEEE Computer Society / ICST, 1-4244-1317-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
A development of multi-SSO authentication and RBAC model in the distributed systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIM ![In: Second IEEE International Conference on Digital Information Management (ICDIM), December 11-13, 2007, Lyon, France, Proceedings, pp. 297-302, 2007, IEEE, 978-1-4244-1475-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Qurban A. Memon, Shakeel A. Khoja |
RBAC and XML security in adhoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSPA ![In: 9th International Symposium on Signal Processing and Its Applications, ISSPA 2007, Sharjah, United Arab Emirates, February 12-15, 2007, pp. 1-4, 2007, IEEE, 1-4244-0779-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Yi-qun Zhu, Jianhua Li, Quan-hai Zhang |
A General Attribute based RBAC Model for Web Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC ![In: 2007 IEEE International Conference on Services Computing (SCC 2007), 9-13 July 2007, Salt Lake City, Utah, USA, pp. 236-239, 2007, IEEE Computer Society, 0-7695-2925-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Mingchao Ma |
Distributed RBAC for subscription-based remote network services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2007 |
RDF |
|
17 | Song-hwa Chae, Wonil Kim, Dong-Kyoo Kim |
uT-RBAC: Ubiquitous Role-Based Access Control Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1), pp. 238-239, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Jonathan K. Adams |
A Service-Centric Approach to a Parameterized RBAC Service ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/cs/0603030, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
17 | Lirong Dai 0002, Kendra M. L. Cooper |
Helping to Meet the Security Needs of Enterprises: Using FDAF to Build RBAC into Software Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Software Engineering Research and Practice ![In: Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, SERP 2006, Las Vegas, Nevada, USA, June 26-29, 2006, Volume 2, pp. 790-796, 2006, CSREA Press, 1-932415-91-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
17 | Jianming Yong, Elisa Bertino, Mark Toleman, Dave Roberts |
Extended RBAC with Role Attributes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACIS ![In: Pacific Asia Conference on Information Systems, PACIS 2006, Kuala Lumpur, Malaysia, July 6-9, 2006, pp. 8, 2006, AISeL. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
17 | Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, James Riely |
lambda-RBAC: Programming with Role-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP (2) ![In: Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II, pp. 456-467, 2006, Springer, 3-540-35907-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Cheng Zang, Zhongdong Huang, Ke Chen 0005, Jinxiang Dong |
An Architecture Approach to Dynamic Policy in RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD (Selected Papers) ![In: Computer Supported Cooperative Work in Design III, 10th International Conference, CSCWD 2006, Nanjing, China, May 3-5, 2006, Revised Selected Papers, pp. 627-634, 2006, Springer, 978-3-540-72862-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Alfonso Rodríguez 0001, Eduardo Fernández-Medina, Mario Piattini |
Towards a UML 2.0 Profile for RBAC Modeling in Activity Diagrams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006, pp. 174-184, 2006, INSTICC Press, 978-972-8865-52-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
17 | Chun-Te Chen, Kun-De Lin, Ying-Chieh Wu, Kun-Lin Lee |
An Approach of Digital Rights Management for E-Museum with Enforce Context Constraints in RBAC Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Taipei, Taiwan, October 8-11, 2006, pp. 1871-1878, 2006, IEEE, 1-4244-0099-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Haibo Yu 0002, Qi Xie, Haiyan Che |
Research on Description Logic Based Conflict Detection Methods for RB-RBAC Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMT ![In: Advances in Intelligent IT - Active Media Technology 2006, Proceedings of the 4th International Conference on Active Media Technology, AMT 2006, June 7-9, 2006, Brisbane, Australia, pp. 335-339, 2006, IOS Press, 978-1-58603-615-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
17 | Qi Li 0002, Xinwen Zhang, Sihan Qing, Mingwei Xu |
Supporting Ad-hoc Collaboration with Group-based RBAC Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: 2nd International ICST Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2006, Atlanta, GA, USA, November 17-20, 2006, 2006, IEEE Computer Society / ICST, 1-4244-0429-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Etienne J. Khayat |
Role-based access control (RBAC) : formal modelling and risk-based administration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2006 |
RDF |
|
17 | Hai Jin 0001, Weizhong Qiang, Xuanhua Shi, Deqing Zou |
RB-GACA: an RBAC based grid access control architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Grid Util. Comput. ![In: Int. J. Grid Util. Comput. 1(1), pp. 61-70, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Wook Shin, Jeong-Gun Lee, Hong Kook Kim, Kouichi Sakurai |
Procedural Constraints in the Extended RBAC and the Coloured Petri Net Modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1), pp. 327-330, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
17 | Shih-Chien Chou |
An RBAC-Based Access Control Model for Object-Oriented Systems Offering Dynamic Aspect Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Inf. Syst. ![In: IEICE Trans. Inf. Syst. 88-D(9), pp. 2143-2147, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Xiaonian Wu, Runlian Zhang, Nong Xiao |
A Community Authorization Mechanism Research Based on RBAC in Data Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCA ![In: Proceedings of The 2005 International Conference on Grid Computing and Applications, GCA 2005, Las Vegas, Nevada, USA, June 20-23, 2005, pp. 210-216, 2005, CSREA Press, 1-932415-57-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
17 | Yuqing Sun 0001, Xiangxu Meng, Shijun Liu, Peng Pan |
An approach for flexible RBAC workflow system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD (1) ![In: Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, CSCWD 2005, Volume 1, May 24-26, 2005, Coventry, UK, pp. 524-529, 2005, IEEE Computer Society, 1-84600-002-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Smithi Piromruen, James B. D. Joshi |
An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORDS ![In: 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2005), 2-4 February 2005, Sedona, AZ, USA, pp. 36-48, 2005, IEEE Computer Society, 0-7695-2347-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Romain Laborde, Bassem Nasser, Frédéric Grasset, François Barrère, Abdelmalek Benzekri |
A Formal Approach for the Evaluation of Network Security Mechanisms Based on RBAC Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISP@ICATPN ![In: Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models, WISP@ICATPN 2004, Bologna, Italy, June 26, 2004, pp. 117-142, 2004, Elsevier. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Andrea Omicini, Alessandro Ricci, Mirko Viroli |
RBAC for Organisation and Security in an Agent Coordination Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecCo ![In: Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, Languages, and Systems, SecCo 2004, London, UK, August 30, 2004, pp. 65-85, 2004, Elsevier. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Chang-Joo Moon, Dae-Ha Park, Soung-Jin Park, Doo-Kwon Baik |
Symmetric RBAC model that takes the separation of duty and role hierarchies into consideration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 23(2), pp. 126-136, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Romain Laborde, Bassem Nasser, Frédéric Grasset, François Barrère, Abdelmalek Benzekri |
Network Security Management: A Formal Evaluation Tool Based on RBAC Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Net-Con ![In: Network Control and Engineering for QoS, Security and Mobility, III - IFIP TC6 / WG6.2, 6.6, 6.7 and 6.8 Third International Conference on Network Control and Engineering for QoS, Security and Mobility, NetCon 2004 on November 2-5, 2004, Palma de Mallorca, Spain, pp. 69-80, 2004, Springer, 978-0-387-23197-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Nimal Nissanke, Etienne J. Khayat |
Risk Based Security Analysis of Permissions in RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security In Information Systems, Proceedings of the 2nd International Workshop on Security In Information Systems, WOSIS 2004, In conjunction with ICEIS 2004, Porto, Portugal, April 2004, pp. 332-341, 2004, INSTICC Press, 972-8865-07-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
17 | Thuong Doan, Steven A. Demurjian, Charles E. Phillips, T. C. Ting |
RBAC/MAC Security Analysis and Design for UML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Research Directions in Data and Applications Security XVIII, IFIP TC11/WG 11.3 Eighteenth Annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia, Spain, pp. 189-203, 2004, Kluwer/Springer, 1-4020-8127-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Mark Strembeck |
Conflict checking of separation of duty constraints in RBAC - implementation experiences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IASTED Conf. on Software Engineering ![In: IASTED International Conference on Software Engineering, part of the 22nd Multi-Conference on Applied Informatics, Innsbruck, Austria, February 17-19, 2004, pp. 224-229, 2004, IASTED/ACTA Press, 0-88986-381-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
17 | Luis Marco Cáceres Alvarez |
Modelo de segurança multilateral e RBAC em um ambiente de serviço no contexto de gerenciamento de contabilidade TINA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2004 |
RDF |
|
17 | Jacques Wainer, Paulo Barthelmess, Akhil Kumar 0001 |
W-RBAC - A Workflow Security Model Incorporating Controlled Overriding of Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Cooperative Inf. Syst. ![In: Int. J. Cooperative Inf. Syst. 12(4), pp. 455-485, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Won Bo Shim, Seog Park |
An Access Control Model for the Adhocracy Organization Using RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(1), pp. 165-175, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
17 | Elisa Bertino |
RBAC models - concepts and trends. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 22(6), pp. 511-514, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Rafae Bhatti, James Joshi, Elisa Bertino, Arif Ghafoor |
Access Control in Dynamic XML-Based Web-Services with X-RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: Proceedings of the International Conference on Web Services, ICWS '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, pp. 243-249, 2003, CSREA Press, 1-892512-49-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
17 | Daniel Sanz-García, Paloma Díaz 0001, Ignacio Aedo |
Integrating RBAC Mechanisms in a Web Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWI ![In: Proceedings of the IADIS International Conference WWW/Internet 2003, ICWI 2003, Algarve, Portugal, November 5-8, 2003, pp. 1101-1104, 2003, IADIS, 972-98947-1-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
17 | Charles E. Phillips, Steven A. Demurjian, T. C. Ting |
Security Assurance for an RBAC/MAC Security Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 260-267, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
17 | Cungang Yang, Chang N. Zhang |
Secure Web-based Applications with XML and RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 276-281, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
17 | Steve Barker, Paul Douglas |
RBAC Policy Implementation for SQL Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XVII: Status and Prospects, IFIP TC-11 WG 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, USA, pp. 288-301, 2003, Kluwer/Springer, 1-4020-8069-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Xinwen Zhang, Jaehong Park, Ravi S. Sandhu |
Schema Based XML Security: RBAC Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XVII: Status and Prospects, IFIP TC-11 WG 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, USA, pp. 330-343, 2003, Kluwer/Springer, 1-4020-8069-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Charles E. Phillips, Steven A. Demurjian, T. C. Ting |
Safety and Liveness for an RBAC/MAC Security Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XVII: Status and Prospects, IFIP TC-11 WG 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, USA, pp. 316-329, 2003, Kluwer/Springer, 1-4020-8069-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Konstantina Stoupa, Athena Vakali |
An XML-based language for access control specifications in an RBAC environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: Washington, D.C., USA, 5-8 October 2003, pp. 1717-1722, 2003, IEEE, 0-7803-7952-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | David W. Chadwick, Alexander Otenko |
RBAC Policies in XML for X.509 Based Privilege Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security in the Information Society: Visions and Perspectives, IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt, pp. 39-54, 2002, Kluwer, 1-4020-7030-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
17 | Daniel Sanz, Paloma Díaz 0001, Ignacio Aedo |
Implementing RBAC Policies in a Web Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ELPUB ![In: Technology Interactions, 6th International ICCC/IFIP Conference on Electronic Publishing held in Karlovy Vary - ELPUB 2002, Karlovy Vary, Czech Republic, November 6-8, 2002. Proceedings, 2002, Verlag für Wissenschaft und Forschung, 3-89700-357-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
17 | Dongwan Shin, Gail-Joon Ahn, Joon S. Park |
An Application of Directory Service Markup Language (DSML) for Role-Based Access Control (RBAC). ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 26th International Computer Software and Applications Conference (COMPSAC 2002), Prolonging Software Life: Development and Redevelopment, 26-29 August 2002, Oxford, England, Proceedings, pp. 934-939, 2002, IEEE Computer Society, 0-7695-1727-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Directory Service Markup Language (DSML), Access Control, Directory Service, Role-based |
17 | Susana Montero, Ignacio Aedo, Paloma Díaz 0001 |
Generation of Personalized Web Courses Using RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AH ![In: Adaptive Hypermedia and Adaptive Web-Based Systems, Second International Conference, AH 2002, Malaga, Spain, May 29-31, 2002, Proceedings, pp. 419-423, 2002, Springer, 3-540-43737-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Sylvia L. Osborn |
Information flow analysis of an RBAC system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 163-168, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
role graphs, role-based access control, mandatory access control |
17 | Steve Barker, Paul Douglas, Terry Fanning |
Implementing RBAC Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Research Directions in Data and Applications Security, IFIP WG 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, UK, pp. 27-36, 2002, Kluwer, 1-4020-7541-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
17 | András Belokosztolszki, David M. Eyers |
Shielding RBAC Infrastructures from Cyberterrorism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Research Directions in Data and Applications Security, IFIP WG 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, UK, pp. 3-14, 2002, Kluwer, 1-4020-7541-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
17 | Sejong Oh, Seog Park |
A Process of Abstracting T-RBAC Aspects from Enterprise Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA ![In: Database Systems for Advanced Applications, Proceedings of the 7th International Conference on Database Systems for Advanced Applications (DASFAA 2001), 18-20 April 2001 - Hong Kong, China, pp. 144-145, 2001, IEEE Computer Society, 0-7695-0996-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Won Bo Shim, Seog Park |
Implementing Web Access Control System for the Multiple Web Servers in the Same Domain Using RBAC Concept. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: Eigth International Conference on Parallel and Distributed Systems, ICPADS 2001, KyongJu City, Korea, June 26-29, 2001, pp. 768-773, 2001, IEEE Computer Society, 0-7695-1153-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Sejong Oh, Seog Park |
Task-Role Based Access Control (T-RBAC): An Improved Access Control Model for Enterprise Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 11th International Conference, DEXA 2000, London, UK, September 4-8, 2000, Proceedings, pp. 264-273, 2000, Springer, 3-540-67978-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Jonathon Tidswell, Trent Jaeger |
Integrated constraints and inheritance in DTAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000, pp. 93-102, 2000, ACM, 1-58113-259-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Axel Mönkeberg, René Rakete |
Three for one: role-based access-control management in rapidly changing heterogeneous environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000, pp. 83-88, 2000, ACM, 1-58113-259-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | SangYeob Na, SuhHyun Cheon |
Role delegation in role-based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000, pp. 39-44, 2000, ACM, 1-58113-259-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
active delegation, delegation protocol, delegation server, passive delegation, role delegation, role-based access control |
17 | Sylvia L. Osborn, Yuxia Guo |
Modeling users in role-based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000, pp. 31-37, 2000, ACM, 1-58113-259-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Jim J. Longstaff, Mike A. Lockyer, M. G. Thick |
A model of accountability, confidentiality and override for healthcare and other applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000, pp. 71-76, 2000, ACM, 1-58113-259-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Haio Roeckle |
Role-finding/role-engineering (panel session). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000, pp. 68, 2000, ACM, 1-58113-259-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
UML |
17 | Joon S. Park, Ravi S. Sandhu, SreeLatha Ghanta |
RBAC on the Web by Secure Cookies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Research Advances in Database and Information Systems Security, IFIP WG 11.3 Thirteenth International Conference on Database Security, July 26-28, 1999, Seattle, Washington, USA, pp. 49-62, 1999, Kluwer, 0-7923-7848-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
17 | John F. Barkley, Konstantin Beznosov, Jinny Uppal |
Supporting Relationships in Access Control Using Role Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999, pp. 55-65, 1999, ACM, 1-58113-180-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Luigi Giuri |
Role-Based Access Control on the Web Using Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999, pp. 11-18, 1999, ACM, 1-58113-180-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Java |
17 | Thomas Hildmann 0001, Jörg Barholdt |
Managing Trust Between Collaborating Companies Using Outsourced Role Based Acces Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999, pp. 105-111, 1999, ACM, 1-58113-180-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
17 | D. J. Thomsen, Richard C. O'Brien, Charles N. Payne |
Napoleon: Network Application Policy Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999, pp. 145-152, 1999, ACM, 1-58113-180-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
17 | David F. Ferraiolo |
Products and Tools (Panel Session). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999, pp. 131, 1999, ACM, 1-58113-180-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
17 | Jonathan D. Moffett, Emil Lupu |
The Uses of Role Hierarchies in Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999, pp. 153-160, 1999, ACM, 1-58113-180-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Jonathon Tidswell, Geoffrey H. Outhred, John Potter |
Dynamic Rights: Safe Extensible Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999, pp. 113-120, 1999, ACM, 1-58113-180-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
17 | David F. Ferraiolo |
User's Perspectives (Panel Session). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999, pp. 67, 1999, ACM, 1-58113-180-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
17 | Konstantin Beznosov, Yi Deng 0001 |
A Framework for Implementing Role-Based Access Control Using CORBA Security Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999, pp. 19-30, 1999, ACM, 1-58113-180-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Gail-Joon Ahn, Ravi S. Sandhu |
The RSL99 Language for Role-Based Separation of Duty Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999, pp. 43-54, 1999, ACM, 1-58113-180-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
17 | John Linn, Magnus Nyström |
Attribute Certification: An Enabling Technology for Delegation and Role-Based Controls in Distributed Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999, pp. 121-130, 1999, ACM, 1-58113-180-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Wei-kuang Huang, Vijayalakshmi Atluri |
SecureFlow: A Secure Web-Enabled Workflow Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999, pp. 83-94, 1999, ACM, 1-58113-180-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Kami Brooks |
Migrating to Role-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999, pp. 71-81, 1999, ACM, 1-58113-180-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Tivoli Management Environment, enterprise systems management, role-based access control, migration, security management |
17 | Trent Jaeger |
On the Increasing Importance of Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999, pp. 33-42, 1999, ACM, 1-58113-180-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Konstantin Beznosov |
Requirements for Access Control: US Healthcare Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Third ACM Workshop on Role-Based Access Control, RBAC 1998, Fairfax, VA, USA, October 22-23, 1998, pp. 43, 1998, ACM, 1-58113-113-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Ravi S. Sandhu, Qamar Munawer |
How to Do Discretionary Access Control Using Roles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Third ACM Workshop on Role-Based Access Control, RBAC 1998, Fairfax, VA, USA, October 22-23, 1998, pp. 47-54, 1998, ACM, 1-58113-113-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Ravi S. Sandhu, Joon S. Park |
Decentralized User-role Assignment for Web-based Intranets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Third ACM Workshop on Role-Based Access Control, RBAC 1998, Fairfax, VA, USA, October 22-23, 1998, pp. 1-12, 1998, ACM, 1-58113-113-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
World Wide Web (WWW) |
17 | Serban I. Gavrila, John F. Barkley |
Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Third ACM Workshop on Role-Based Access Control, RBAC 1998, Fairfax, VA, USA, October 22-23, 1998, pp. 81-90, 1998, ACM, 1-58113-113-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
17 | D. Richard Kuhn |
Role Based Access Control on MLS Systems without Kernel Changes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Third ACM Workshop on Role-Based Access Control, RBAC 1998, Fairfax, VA, USA, October 22-23, 1998, pp. 25-32, 1998, ACM, 1-58113-113-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Luigi Giuri |
Role-based Access Control in Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Third ACM Workshop on Role-Based Access Control, RBAC 1998, Fairfax, VA, USA, October 22-23, 1998, pp. 91-100, 1998, ACM, 1-58113-113-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Java |
17 | Takeo Hamada |
Role-based Access Control in Telecommunication Service Management - Dynamic Role Creation and Management in TINA Service Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Third ACM Workshop on Role-Based Access Control, RBAC 1998, Fairfax, VA, USA, October 22-23, 1998, pp. 105-113, 1998, ACM, 1-58113-113-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
role algebra, role class hierarchy, security space, strongly-roled system, telecommunication service management, role-based access control, TINA, role mapping |
17 | Jonathan D. Moffett |
Control Principles and Role Hierarchies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Third ACM Workshop on Role-Based Access Control, RBAC 1998, Fairfax, VA, USA, October 22-23, 1998, pp. 63-69, 1998, ACM, 1-58113-113-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
17 | George Coulouris, Jean Dollimore, Marcus Roberts |
Role and Task-Based Access Control in the PerDiS Groupware Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Third ACM Workshop on Role-Based Access Control, RBAC 1998, Fairfax, VA, USA, October 22-23, 1998, pp. 115-121, 1998, ACM, 1-58113-113-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Ravi S. Sandhu, Venkata Bhamidipati |
An Oracle Implementation of the PRA97 Model for Permission-Role Assignment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Third ACM Workshop on Role-Based Access Control, RBAC 1998, Fairfax, VA, USA, October 22-23, 1998, pp. 13-21, 1998, ACM, 1-58113-113-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
SQL, ORACLE |
17 | John F. Barkley, Anthony Cincotta |
Managing Role/Permission Relationships Using Object Access Types. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Third ACM Workshop on Role-Based Access Control, RBAC 1998, Fairfax, VA, USA, October 22-23, 1998, pp. 73-80, 1998, ACM, 1-58113-113-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Microsoft Windows NT |
17 | Ravi S. Sandhu |
Role Activation Hierarchies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Third ACM Workshop on Role-Based Access Control, RBAC 1998, Fairfax, VA, USA, October 22-23, 1998, pp. 33-40, 1998, ACM, 1-58113-113-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Trent Jaeger, Frederique Giraud, Nayeem Islam, Jochen Liedtke |
A role-based access control model for protection domain derivation and management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 95-106, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Java |
17 | E. B. Fernandez, J. C. Hawkins |
Determining role rights from use cases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 121-125, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
object-oriented authorization, role-based-access-control, use cases, object-oriented analysis, authorization models |
17 | Tor Didriksen |
Rule based database access control - a practical approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 143-151, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
SQL |
17 | Elisa Bertino, Elena Ferrari, Vijayalakshmi Atluri |
A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 1-12, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
17 | Christian Friberg, Achim Held |
Support for discretionary role based access control in ACL-oriented operating systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 83-94, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
World Wide Web (WWW), UNIX |
17 | Sylvia L. Osborn |
Mandatory access control and role-based access control revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 31-40, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
17 | D. Richard Kuhn |
Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 23-30, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
17 | Luigi Giuri, Pietro Iglio |
Role templates for content-based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 153-159, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
SQL |
17 | Roshan K. Thomas |
Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 13-19, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
17 | John F. Barkley |
Comparing simple role based access control models and access control lists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 127-132, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Microsoft Windows NT |
17 | Roland Awischus |
Role based access control with the security administration manager (SAM). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 61-68, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
17 | David F. Ferraiolo, John F. Barkley |
Specifying and managing role-based access control within a corporate intranet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 77-82, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
World Wide Web (WWW) |
17 | Ravi S. Sandhu, Venkata Bhamidipati, Edward J. Coyne, Srinivas Ganta, Charles E. Youman |
The ARBAC97 model for role-based administration of roles: preliminary description and outline. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 41-50, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
17 | Ravi S. Sandhu |
Rationale for the RBAC96 family of access control models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the First ACM Workshop on Role-Based Access Control, RBAC 1995, Gaithersburg, MD, USA, November 30 - December 2, 1995, 1995, ACM, 0-89791-759-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|