The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for RBAC with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1995 (22) 1996-1997 (21) 1998-1999 (43) 2000 (22) 2001 (28) 2002 (35) 2003 (56) 2004 (58) 2005 (80) 2006 (90) 2007 (103) 2008 (105) 2009 (74) 2010 (45) 2011 (39) 2012 (31) 2013 (32) 2014 (24) 2015 (21) 2016 (21) 2017-2018 (25) 2019 (21) 2020-2021 (19) 2022-2024 (14)
Publication types (Num. hits)
article(179) incollection(11) inproceedings(830) phdthesis(4) proceedings(5)
Venues (Conferences, Journals, ...)
SACMAT(83) ACM Workshop on Role-Based Acc...(82) DBSec(23) ACM Trans. Inf. Syst. Secur.(18) ACSAC(15) ARES(15) WETICE(15) CoRR(11) POLICY(11) Comput. Secur.(9) IAS(9) ICISS(9) SAC(9) AsiaCCS(8) CCS(8) CSCWD(7) More (+10 of total 455)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 936 occurrences of 345 keywords

Results
Found 1029 publication records. Showing 1029 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17LouAnna Notargiacomo Role-based access control in ORACLE7 and Trusted ORACLE7. Search on Bibsonomy ACM Workshop on Role-Based Access Control The full citation details ... 1995 DBLP  DOI  BibTeX  RDF ORACLE
17Edward J. Coyne Role engineering. Search on Bibsonomy ACM Workshop on Role-Based Access Control The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
17Roshan K. Thomas Role-based access control and distributed object-based enterprise computing. Search on Bibsonomy ACM Workshop on Role-Based Access Control The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
17Yahya Y. Al-Salqan, V. Juggy Jagannathan, Tad Davis, Nich Zhang, Y. V. Ramana Reddy Security and confidentiality in health care informatics. Search on Bibsonomy ACM Workshop on Role-Based Access Control The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
17John F. Barkley Implementing role-based access control using object technology. Search on Bibsonomy ACM Workshop on Role-Based Access Control The full citation details ... 1995 DBLP  DOI  BibTeX  RDF C++
17Virgil D. Gligor Characteristics of role-based access control. Search on Bibsonomy ACM Workshop on Role-Based Access Control The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
17Steven A. Demurjian, T. C. Ting, M.-Y. Hu Role-based access control for object-oriented/C++ systems. Search on Bibsonomy ACM Workshop on Role-Based Access Control The full citation details ... 1995 DBLP  DOI  BibTeX  RDF C++
17Jeremy Epstein, Ravi S. Sandhu NetWare 4 as an example of role-based access control. Search on Bibsonomy ACM Workshop on Role-Based Access Control The full citation details ... 1995 DBLP  DOI  BibTeX  RDF NetWare
17Fang Chen, Ravi S. Sandhu Constraints for role-based access control. Search on Bibsonomy ACM Workshop on Role-Based Access Control The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
17Ravi S. Sandhu Workshop summary. Search on Bibsonomy ACM Workshop on Role-Based Access Control The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
17David F. Ferraiolo, D. Richard Kuhn Future directions in role-based access control. Search on Bibsonomy ACM Workshop on Role-Based Access Control The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
17Edward J. Coyne, Charles E. Youman Workshop discussion. Search on Bibsonomy ACM Workshop on Role-Based Access Control The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
17Matunda Nyanchama, Sylvia L. Osborn The role graph model. Search on Bibsonomy ACM Workshop on Role-Based Access Control The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
17Ravi S. Sandhu Roles versus groups. Search on Bibsonomy ACM Workshop on Role-Based Access Control The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
17Luigi Giuri Role-based access control: a natural approach. Search on Bibsonomy ACM Workshop on Role-Based Access Control The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
17Trent Jaeger, Atul Prakash 0001 Requirements of role-based access control for collaborative systems. Search on Bibsonomy ACM Workshop on Role-Based Access Control The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
17Emil Lupu, Damian A. Marriott, Morris Sloman, Nicholas Yialelis A policy based role framework for access control. Search on Bibsonomy ACM Workshop on Role-Based Access Control The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
15Steffen Kunz, Benjamin Fabian, Daniel Marx 0001, Sebastian Müller 0001 Engineering Policies for Secure Interorganizational Information Flow. Search on Bibsonomy EDOCW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Interorganizational Processes, RBAC, Access Control Policies
15Ligang He, Kewei Duan, Xueguang Chen, Deqing Zou, Zongfen Han, Ali Fadavinia, Stephen A. Jarvis Modelling Workflow Executions under Role-Based Authorisation Control. Search on Bibsonomy IEEE SCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Modelling, Workflow, RBAC, Authorisation
15Dizza Beimel, Mor Peleg The Context and the SitBAC Models for Privacy Preservation—An Experimental Comparison of Model Comprehension and Synthesis. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF SitBAC, ontology, access control, Knowledge representation, conceptual model, authorization, RBAC
15Murillo Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu 0001, Keith Irwin Toward practical authorization-dependent user obligation systems. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF RBAC, policy, accountability, obligations, authorization systems
15Christopher Alm, Roland Illig Translating High-Level Authorization Constraints to XACML. Search on Bibsonomy SERVICES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF OPL, RBAC, Translation, XACML, Separation of Duty
15Ezedin E. Barka, Yasser Gadallah A role-based protocol for secure multicast communications in mobile ad hoc networks. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF MANET, access control, RBAC, multicast communications, multicast security
15Alan H. Karp, Jun Li 0008 Solving the Transitive Access Problem for the Services Oriented Architecture. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF PBAC, ABAC, ZBAC, web services, SOA, access control, RBAC
15Mario Frank 0001, Joachim M. Buhmann, David A. Basin On the definition of role mining. Search on Bibsonomy SACMAT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF RBAC, role engineering, role mining
15Yu-Cheng Hsiao, Gwan-Hwan Hwang Implementing the Chinese Wall Security Model in Workflow Management Systems. Search on Bibsonomy ISPA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Workflow management system (WfMS), Chinese wall security model (CWSM), Role-based access control (RBAC)
15David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen Adding support to XACML for multi-domain user to user dynamic delegation of authority. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Delegation of authority, Credential validation service, RBAC, XACML
15Heiko Klarl, Korbinian Molitorisz, Christian Emig, Karsten Klinger, Sebastian Abeck Extending Role-Based Access Control for Business Usage. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Access Control, RBAC, Business Process Modelling, Roles, Identity Management, Business-IT Alignment
15Jérémy Briffaut, Xavier Kauffmann-Tourkestansky, Jean-François Lalande, Waleed W. Smari Generation of Role Based Access Control Security Policies for Java Collaborative Applications. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF java, RBAC, collaborative applications
15Mario Frank 0001, Andreas P. Streich, David A. Basin, Joachim M. Buhmann A probabilistic approach to hybrid role mining. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF business meaning, hybrid role mining, machine learning, role mining, rbac
15Ezedin E. Barka, Emad Eldin Mohamed Securing hierarchical multicast communications using roles. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF access control, RBAC, multicast communications, multicast security
15Min Xu, Duminda Wijesekera A role-based XACML administration and delegation profile and its enforcement architecture. Search on Bibsonomy SWS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF arbac, access control, authorization, delegation, xacml, web service security, administration, rbac
15Samrat Mondal, Shamik Sural Supporting Negative Authorization in Spatiotemporal Role Based Access Control. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Negative Authorization, Spatiotemporal Context, Access Control, RBAC
15Zhiyi Wang, Zheng Wang, Jiaxi Luo Application of Organization Model Based on LDAP Directory Server to Workflow Management System. Search on Bibsonomy PACIIA (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RBAC, workflow management system, LDAP, organization model
15Sun K. Yoo, Jun Choe, Do Yoon Kim Agent Based Architecture for Secure Access from Multiple Hospitals. Search on Bibsonomy ACIS-ICIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Integrated Access Control, Web Service, RBAC, XML Security
15Mayank Keshariya, Ray Hunt A new architecture for performance-based policy management in heterogeneous wireless networks. Search on Bibsonomy Mobility Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ABC (always best connected), PBM (policy-based management), RBAC (role-based access control), mapping translators, policy semantic and syntax analysis, vertical handoff
15Xingang Wang, Dengguo Feng, Zhen Xu, Honggang Hu Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secure Policy Interoperation, RBAC, Multi-Domain
15Thang Tran, Kai Daniel, Christian Wietfeld Secure and Reliable Communication Infrastructure for a Distributed IT-Federation. Search on Bibsonomy Mobile Response The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IT-Federation, Authentication, Authorization, Role Based Access Control (RBAC), Single Sign-On (SSO)
15Subhendu Aich, Shamik Sural, Arun K. Majumdar Spatiotemporal Connectives for Security Policy in the Presence of Location Hierarchy. Search on Bibsonomy TrustBus The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Spatiotemporal event, Policy connectives, Location hierarchy, RBAC
15Ying Liu, Jean Bacon A Practical Synthesis of Dynamic Role Settings in Telecare Services. Search on Bibsonomy ICDS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Role Provisioning, Dynamic Trust, Role Context, Dynamic Access, RBAC, e-Service, Telecare, Meta-synthesis
15Jianwei Yue, Hongchun Cai, Luyao Chen, Wei Zhuang Study on Authorization Management Model of One-stop Office System. Search on Bibsonomy CCTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF one-stop office system, RBAC, authorization management
15Liang Chen, Jason Crampton Inter-domain role mapping and least privilege. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF IDRM, RBAC, least privilege
15Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo The role mining problem: finding a minimal descriptive set of roles. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RBAC, role engineering, role mining
15Stijn Goedertier, Christophe Mues, Jan Vanthienen Specifying Process-Aware Access Control Rules in SBVR. Search on Bibsonomy RuleML The full citation details ... 2007 DBLP  DOI  BibTeX  RDF access control, RBAC, BPM, defeasible logic, SBVR
15Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warner RoleMiner: mining roles using subset enumeration. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RBAC, role engineering, role mining
15Maria Luisa Damiani, Elisa Bertino Architectural issues for a location-aware role-based access control system. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF location-based services, RBAC, roles, spatial context
15Hyun-Dong Lee, Kiyeal Lee, Mokdong Chung Enterprise Application Framework for Constructing Secure RFID Application. Search on Bibsonomy ICHIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, RFID, RBAC, Application Framework
15Vugranam C. Sreedhar Data-centric security: role analysis and role typestates. Search on Bibsonomy SACMAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF role analysis, role escape analysis, role typestates, RBAC
15Steven J. Greenwald E-Prime for security: a new security paradigm. Search on Bibsonomy NSPW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Clark-Wilson, E-Prime, Sapir-Whorf hypothesis, disaster planning, enterprise security policy, general semantics, incident handling, informal security policy modeling, organizational security policy, principle of linguistic relativity, security life cycle, software life cycle SP800-12, user awareness, user centered security, user support and operations, modeling, formal methods, planning, RBAC, role-based access control, risk management, information assurance, security engineering, life cycle, spam detection, user training, security policy modeling, program management
15Maarten Rits, Benjamin De Boe, Andreas Schaad XacT: a bridge between resource management and access control in multi-layered applications. Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2005 DBLP  DOI  BibTeX  RDF workflow security, aspect oriented programming, role-based access control (RBAC)
15Li Yang 0001, Raimund K. Ege, Huiqun Yu Mediation security specification and enforcement for heterogeneous databases. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, XML, RBAC, mediation
15Anour F. A. Dafa-Alla, Eun Hee Kim, Keun Ho Ryu, Yong Jun Heo PRBAC: An Extended Role Based Access Control for Privacy Preserving Data Mining. Search on Bibsonomy ACIS-ICIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RBAC, Privacy preserving data mining
15Eunjee Song, Raghu Reddy, Robert B. France, Indrakshi Ray, Geri Georg, Roger T. Alexander Verifiable composition of access control and application features. Search on Bibsonomy SACMAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF modeling, UML, verification, RBAC
15Jacques Wainer, Fábio de Lima Bezerra, Paulo Barthelmess Tucupi: a flexible workflow system based on overridable constraints. Search on Bibsonomy SAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF fexibility, workflow, constraints, RBAC
15Roberto Tamassia, Danfeng Yao, William H. Winsborough Role-based cascaded delegation. Search on Bibsonomy SACMAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF access control, RBAC, trust management, delegation
15David A. Basin, Jürgen Doser, Torsten Lodderstedt Model driven security for process-oriented systems. Search on Bibsonomy SACMAT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF UML, RBAC, model driven architecture, metamodeling, security engineering
15Axel Kern, Andreas Schaad, Jonathan D. Moffett An administration concept for the enterprise role-based access control model. Search on Bibsonomy SACMAT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF SAM Jupiter, administrative role-based access control (ARBAC), automated identity management, enterprise role-based access control (ERBAC), enterprise roles, security provisioning, role-based access control (RBAC), scopes, security administration
15David W. Chadwick, Alexander Otenko The PERMIS X.509 role based privilege management infrastructure. Search on Bibsonomy SACMAT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Privilege management infrastructure, XML, authorization, RBAC, policies, X.509, attribute certificates
15Nathan N. Vuong, Geoffrey S. Smith, Yi Deng 0001 Managing security policies in a distributed environment using eXtensible markup language (XML). Search on Bibsonomy SAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF managing security policies, Java, XML, XML, RBAC, meta-language, distributed authorization
15Walt Yao, Ken Moody, Jean Bacon A model of OASIS role-based access control and its support for active security. Search on Bibsonomy SACMAT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF RBAC, role based access control, policy, service level agreements, certificates, OASIS
9Ehab Al-Shaer Automated management of network access control from design to enforcement. Search on Bibsonomy SACMAT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
9Hua Wang 0002, Yanchun Zhang, Jinli Cao Effective Collaboration with Information Sharing in Virtual Universities. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Shaomin Zhang, Haiyan Zhang, Baoyi Wang Study on Centralized Authorization Model Supporting Multiple Access Control Models. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Mehran Ahsant, Jim Basney Workflows in Dynamic and Restricted Delegation. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Federica Paci, Rodolfo Ferrini, Elisa Bertino Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes. Search on Bibsonomy ICWS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Ravi Mukkamala, Vishnu Kamisetty, Pawankumar Yedugani Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper). Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF failed accesses, Access control, role-based access control, role mining, misconfigurations
9Christoph Sturm, Ela Hunt, Marc H. Scholl Distributed Privilege Enforcement in PACS. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens Reaction Policy Model Based on Dynamic Organizations and Threat Context. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Manachai Toahchoodee, Xing Xie 0002, Indrakshi Ray Towards Trustworthy Delegation in Role-Based Access Control Model. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Teo Poh Kuang, Hamidah Ibrahim Security privacy access control for policy integration and conflict reconciliation in health care organizations collaborations. Search on Bibsonomy iiWAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF conflict reconciliation, cross-organization collaboration, security policy integration, role-based access control, logical reasoning
9Ji-Won Byun, Ninghui Li Purpose based access control for privacy protection in relational database systems. Search on Bibsonomy VLDB J. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Private data management, Privacy, Access control, Purpose
9Tomoya Enokido, Makoto Takizawa 0001 Preventing Illegal Information Flow Based on Role-Based Access Control Model. Search on Bibsonomy NBiS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Na Zhao 0003, Min Chen 0009, Shu-Ching Chen, Mei-Ling Shyu MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems. Search on Bibsonomy ISORC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Role-based Access Control, distributed multimedia systems
9Lillian Røstad, Øystein Nytrø Personalized access control for a personally controlled health record. Search on Bibsonomy CSAW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF access control
9Lingli Deng, Yeping He, Ziyao Xu Separation of Duty in Trust-Based Collaboration. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secure Collaboration, Statically Mutual Exclusive Roles, Role-Based Access Control, Separation of Duty
9Sharma Chakravarthy, Raman Adaikkalavan Events and streams: harnessing and unleashing their synergy! Search on Bibsonomy DEBS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF expressive pattern search, monitoring applications, information security, complex event processing, data stream processing
9Fujun Feng, Chuang Lin 0002, Dongsheng Peng, Junshan Li A Trust and Context Based Access Control Model for Distributed Systems. Search on Bibsonomy HPCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Fachao Deng, An'an Luo, Yaokun Zhang, Zhen Chen, Xuehai Peng, Xin Jiang, Dongsheng Peng TNC-UTM: A Holistic Solution to Secure Enterprise Networks. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Xiyuan Chen, Ouyang Yang, Miaoliang Zhu, Yan He 0001 Semantic-Aware Access Control for Grid Application. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Lingli Deng, Yeping He, Ziyao Xu Enforcing Separation of Duty in Ad Hoc Collaboration. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Michael Decker Requirements for a location-based access control model. Search on Bibsonomy MoMM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mobile computing, access control, location-based services, security model
9Qun Ni, Elisa Bertino, Jorge Lobo 0001 An obligation model bridging access control policies and privacy policies. Search on Bibsonomy SACMAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF privacy, role based access control, policy, obligation
9Alina Ene, William G. Horne, Nikola Milosavljevic, Prasad Rao, Robert Schreiber, Robert Endre Tarjan Fast exact and heuristic methods for role minimization problems. Search on Bibsonomy SACMAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF role-based access control, role mining
9Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko Orsini A location aware role and attribute based access control system. Search on Bibsonomy GIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Min Li, Hua Wang 0002, Ashley W. Plank, Jianming Yong Advanced Permission-Role Relationship in Role-Based Access Control. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Pingping Zhang, Shiguang Ju, Weihe Chen A Location-Based Secure Spatial Audit Policy Model. Search on Bibsonomy CSSE (4) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Hui Xie, Bin Zhang 0015, Dianyou Hu A Role-Based Dynamic Authorization Model and Its Implementation in PMI. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Zhikun Zhang, Jianguo Xiao, Hanyi Li, Youping Geng An Extended Permission-Based Delegation Authorization Model. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Diao Mingguang, Xue Tao, Pan Wenyong Design of Universal Authority Management Model of Online Teaching System. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Tejeddine Mouelhi, Franck Fleurey, Benoit Baudry, Yves Le Traon A Model-Based Framework for Security Policy Specification, Deployment and Testing. Search on Bibsonomy MoDELS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Model-driven engineering methodology, Security, Metamodeling
9Lijun Yu, Robert B. France, Indrakshi Ray Scenario-Based Static Analysis of UML Class Models. Search on Bibsonomy MoDELS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Behavioral Properties, UML, Snapshot, Model Analysis
9Akhil Kumar 0001, Rong Liu A Rule-Based Framework Using Role Patterns for Business Process Compliance. Search on Bibsonomy RuleML The full citation details ... 2008 DBLP  DOI  BibTeX  RDF generic role patterns, compliant business process, task categories, declarative approach, Sarbanes-oxley, constraints, rules, separation of duty, internal control, control policies
9Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko Orsini A Constraint and Attribute Based Security Framework for Dynamic Role Assignment in Collaborative Environments. Search on Bibsonomy CollaborateCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Semantic Web, role-based access control, reasoning, dynamic environments, collaborative applications
9Youna Jung, Amirreza Masoumzadeh 0001, James B. D. Joshi, Minkoo Kim RiBAC: Role Interaction Based Access Control Model for Community Computing. Search on Bibsonomy CollaborateCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Role interaction, Multiagent system, Role-based Access Control, Cooperation, Community computing
9Dana Al Kukhun, Florence Sèdes Adaptive Solutions for Access Control within Pervasive Healthcare Systems. Search on Bibsonomy ICOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF adaptation, Access control, pervasive computing, XACML
9Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Stefanie Rinderle-Ma, Manfred Reichert Managing the Life Cycle of Access Rules in CEOSIS. Search on Bibsonomy EDOC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Masakazu Maruoka, Alireza Goudarzi Nemati, Valbona Barolli, Tomoya Enokido, Makoto Takizawa 0001 Making Societies in Peer-to-Peer (P2P) Overlay Networks. Search on Bibsonomy CISIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Xinwen Zhang, Qi Li 0002, Jean-Pierre Seifert, Mingwei Xu Flexible Authorization with Decentralized Access Control Model for Grid Computing. Search on Bibsonomy HASE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Jungin Kim, Bhavani Thuraisingham Design of Secure CAMIN Application System Based on Dependable and Secure TMO and RT-UCON. Search on Bibsonomy ISORC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 1029 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license