The SCEAS System
Navigation Menu

Conferences in DBLP

ACM Workshop on Role-Based Access Control (rbac)
1998 (conf/rbac/1998)

  1. Ravi S. Sandhu, Joon S. Park
    Decentralized User-role Assignment for Web-based Intranets. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1998, pp:1-12 [Conf]
  2. Ravi S. Sandhu, Venkata Bhamidipati
    An Oracle Implementation of the PRA97 Model for Permission-Role Assignment. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1998, pp:13-21 [Conf]
  3. D. Richard Kuhn
    Role Based Access Control on MLS Systems without Kernel Changes. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1998, pp:25-32 [Conf]
  4. Ravi S. Sandhu
    Role Activation Hierarchies. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1998, pp:33-40 [Conf]
  5. Konstantin Beznosov
    Requirements for Access Control: US Healthcare Domain. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1998, pp:43- [Conf]
  6. Ravi S. Sandhu, Qamar Munawer
    How to Do Discretionary Access Control Using Roles. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1998, pp:47-54 [Conf]
  7. Cheh Goh, Adrian Baldwin
    Towards a More Complete Model of Role. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1998, pp:55-62 [Conf]
  8. Jonathan D. Moffett
    Control Principles and Role Hierarchies. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1998, pp:63-69 [Conf]
  9. John F. Barkley, Anthony Cincotta
    Managing Role/Permission Relationships Using Object Access Types. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1998, pp:73-80 [Conf]
  10. Serban I. Gavrila, John F. Barkley
    Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1998, pp:81-90 [Conf]
  11. Luigi Giuri
    Role-based Access Control in Java. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1998, pp:91-100 [Conf]
  12. Takeo Hamada
    Role-based Access Control in Telecommunication Service Management - Dynamic Role Creation and Management in TINA Service Environment. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1998, pp:105-113 [Conf]
  13. George Coulouris, Jean Dollimore, Marcus Roberts
    Role and Task-Based Access Control in the PerDiS Groupware Platform. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1998, pp:115-121 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002