The SCEAS System
Navigation Menu

Conferences in DBLP

ACM Workshop on Role-Based Access Control (rbac)
2000 (conf/rbac/2000)

  1. Gail-Joon Ahn, Ravi S. Sandhu, Myong H. Kang, Joon S. Park
    Injecting RBAC to secure a Web-based workflow system. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:1-10 [Conf]
  2. Ramaswamy Chandramouli
    Application of XML tools for enterprise-wide RBAC implementation tasks. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:11-18 [Conf]
  3. Elisa Bertino, Piero A. Bonatti, Elena Ferrari
    TRBAC: a temporal role-based access control model. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:21-30 [Conf]
  4. Sylvia L. Osborn, Yuxia Guo
    Modeling users in role-based access control. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:31-37 [Conf]
  5. SangYeob Na, SuhHyun Cheon
    Role delegation in role-based access control. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:39-44 [Conf]
  6. Ravi S. Sandhu, David F. Ferraiolo, D. Richard Kuhn
    The NIST model for role-based access control: towards a unified standard. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:47-63 [Conf]
  7. Trent Jaeger, Jonathon Tidswell
    Rebuttal to the NIST RBAC model proposal. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:65-66 [Conf]
  8. Haio Roeckle
    Role-finding/role-engineering (panel session). [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:68- [Conf]
  9. Jim J. Longstaff, Mike A. Lockyer, M. G. Thick
    A model of accountability, confidentiality and override for healthcare and other applications. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:71-76 [Conf]
  10. Thomas Gebhardt, Thomas Hildmann
    Enabling technologies for role based online decision engines. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:77-82 [Conf]
  11. Axel Mönkeberg, René Rakete
    Three for one: role-based access-control management in rapidly changing heterogeneous environments. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:83-88 [Conf]
  12. Jonathon Tidswell, Trent Jaeger
    Integrated constraints and inheritance in DTAC. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:93-102 [Conf]
  13. Haio Roeckle, Gerhard Schimpf, Rupert Weidinger
    Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:103-110 [Conf]
  14. Ravi S. Sandhu
    Engineering authority and trust in cyberspace: the OM-AM and RBAC way. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:111-119 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002