The SCEAS System
Navigation Menu

Conferences in DBLP

ACM Workshop on Role-Based Access Control (rbac)
1999 (conf/rbac/1999)

  1. Joon S. Park, Ravi S. Sandhu
    RBAC on the Web by Smart Certificates. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:1-9 [Conf]
  2. Luigi Giuri
    Role-Based Access Control on the Web Using Java. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:11-18 [Conf]
  3. Konstantin Beznosov, Yi Deng
    A Framework for Implementing Role-Based Access Control Using CORBA Security Service. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:19-30 [Conf]
  4. Trent Jaeger
    On the Increasing Importance of Constraints. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:33-42 [Conf]
  5. Gail-Joon Ahn, Ravi S. Sandhu
    The RSL99 Language for Role-Based Separation of Duty Constraints. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:43-54 [Conf]
  6. John F. Barkley, Konstantin Beznosov, Jinny Uppal
    Supporting Relationships in Access Control Using Role Based Access Control. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:55-65 [Conf]
  7. David Ferriaolo
    User's Perspectives (Panel Session). [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:67- [Conf]
  8. Kami Brooks
    Migrating to Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:71-81 [Conf]
  9. Wei-kuang Huang, Vijayalakshmi Atluri
    SecureFlow: A Secure Web-Enabled Workflow Management System. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:83-94 [Conf]
  10. Glenn Faden
    RBAC in UNIX Administration. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:95-101 [Conf]
  11. Thomas Hildmann, Jörg Barholdt
    Managing Trust Between Collaborating Companies Using Outsourced Role Based Acces Control. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:105-111 [Conf]
  12. Jonathon Tidswell, Geoffrey H. Outhred, John Potter
    Dynamic Rights: Safe Extensible Access Control. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:113-120 [Conf]
  13. John Linn, Magnus Nyström
    Attribute Certification: An Enabling Technology for Delegation and Role-Based Controls in Distributed Environments. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:121-130 [Conf]
  14. David Ferriaolo
    Products and Tools (Panel Session). [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:131- [Conf]
  15. Pete Epstein, Ravi S. Sandhu
    Towards a UML Based Approach to Role Engineering. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:135-143 [Conf]
  16. D. J. Thomsen, Richard C. O'Brien, C. Payne
    Napoleon: Network Application Policy Environment. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:145-152 [Conf]
  17. Jonathan D. Moffett, Emil Lupu
    The Uses of Role Hierarchies in Access Control. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:153-160 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002