The SCEAS System
Navigation Menu

Conferences in DBLP

ACM Workshop on Role-Based Access Control (rbac)
1995 (conf/rbac/1995)

  1. Roshan K. Thomas
    Role-based access control and distributed object-based enterprise computing. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  2. Virgil D. Gligor
    Characteristics of role-based access control. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  3. Trent Jaeger, Atul Prakash
    Requirements of role-based access control for collaborative systems. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  4. Emil Lupu, Damian A. Marriott, Morris Sloman, Nicholas Yialelis
    A policy based role framework for access control. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  5. LouAnna Notargiacomo
    Role-based access control in ORACLE7 and Trusted ORACLE7. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  6. Matunda Nyanchama, Sylvia L. Osborn
    The role graph model. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  7. Ravi S. Sandhu
    Workshop summary. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  8. Ravi S. Sandhu
    Issues in RBAC. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  9. Ravi S. Sandhu
    Roles versus groups. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  10. Luigi Giuri
    Role-based access control: a natural approach. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  11. David F. Ferraiolo, D. Richard Kuhn
    Future directions in role-based access control. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  12. Jeremy Epstein, Ravi S. Sandhu
    NetWare 4 as an example of role-based access control. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  13. Yahya Y. Al-Salqan, V. Juggy Jagannathan, Tad Davis, Nich Zhang, Y. V. Ramana Reddy
    Security and confidentiality in health care informatics. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  14. John F. Barkley
    Implementing role-based access control using object technology. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  15. Charles E. Youman
    RBAC transition. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  16. Fang Chen, Ravi S. Sandhu
    Constraints for role-based access control. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  17. Edward J. Coyne
    Prioritizing RBAC features. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  18. Edward J. Coyne
    Role engineering. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  19. Edward J. Coyne, Charles E. Youman
    Workshop discussion. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  20. Steven A. Demurjian, T. C. Ting, M.-Y. Hu
    Role-based access control for object-oriented/C++ systems. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  21. Ravi S. Sandhu
    Rationale for the RBAC96 family of access control models. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002