The SCEAS System
Navigation Menu

Conferences in DBLP

ACM Workshop on Role-Based Access Control (rbac)
1997 (conf/rbac/1997)

  1. Elisa Bertino, Elena Ferrari, Vijayalakshmi Atluri
    A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1997, pp:1-12 [Conf]
  2. Roshan K. Thomas
    Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1997, pp:13-19 [Conf]
  3. D. Richard Kuhn
    Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1997, pp:23-30 [Conf]
  4. Sylvia L. Osborn
    Mandatory access control and role-based access control revisited. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1997, pp:31-40 [Conf]
  5. Ravi S. Sandhu, Venkata Bhamidipati, Edward J. Coyne, Srinivas Ganta, Charles E. Youman
    The ARBAC97 model for role-based administration of roles: preliminary description and outline. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1997, pp:41-50 [Conf]
  6. William J. Meyers
    RBAC emulation on trusted DG/UX. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1997, pp:55-60 [Conf]
  7. Roland Awischus
    Role based access control with the security administration manager (SAM). [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1997, pp:61-68 [Conf]
  8. Larry S. Bartz
    hyperDRIVE: leveraging LDAP to implement RBAC on the Web. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1997, pp:69-74 [Conf]
  9. David F. Ferraiolo, John F. Barkley
    Specifying and managing role-based access control within a corporate intranet. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1997, pp:77-82 [Conf]
  10. Christian Friberg, Achim Held
    Support for discretionary role based access control in ACL-oriented operating systems. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1997, pp:83-94 [Conf]
  11. Trent Jaeger, Frederique Giraud, Nayeem Islam, Jochen Liedtke
    A role-based access control model for protection domain derivation and management. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1997, pp:95-106 [Conf]
  12. Raymond K. Wong
    RBAC support in object-oriented role databases. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1997, pp:109-120 [Conf]
  13. E. B. Fernandez, J. C. Hawkins
    Determining role rights from use cases. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1997, pp:121-125 [Conf]
  14. John F. Barkley
    Comparing simple role based access control models and access control lists. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1997, pp:127-132 [Conf]
  15. Emil Lupu, Morris Sloman
    Reconciling role based management and role based access control. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1997, pp:135-141 [Conf]
  16. Tor Didriksen
    Rule based database access control - a practical approach. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1997, pp:143-151 [Conf]
  17. Luigi Giuri, Pietro Iglio
    Role templates for content-based access control. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1997, pp:153-159 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002