|
Conferences in DBLP
- Xinwen Zhang, Jaehong Park, Francesco Parisi-Presicce, Ravi S. Sandhu
A logical specification for usage control. [Citation Graph (0, 0)][DBLP] SACMAT, 2004, pp:1-10 [Conf]
- Urs Hengartner, Peter Steenkiste
Implementing access control to people location information. [Citation Graph (0, 0)][DBLP] SACMAT, 2004, pp:11-20 [Conf]
- Horst Wedde, Mario Lischka
Role-based access control in ambient and remote space. [Citation Graph (0, 0)][DBLP] SACMAT, 2004, pp:21-30 [Conf]
- Joachim Biskup, Sandra Wortmann
Towards a credential-based implementation of compound access control policies. [Citation Graph (0, 0)][DBLP] SACMAT, 2004, pp:31-40 [Conf]
- Marina Bykova, Mikhail J. Atallah
Succinct specifications of portable document access policies. [Citation Graph (0, 0)][DBLP] SACMAT, 2004, pp:41-50 [Conf]
- Xuhui Ao, Naftaly H. Minsky
On the role of roles: from role-based to role-sensitive access control. [Citation Graph (0, 0)][DBLP] SACMAT, 2004, pp:51-60 [Conf]
- Irini Fundulaki, Maarten Marx
Specifying access control policies for XML documents with XPath. [Citation Graph (0, 0)][DBLP] SACMAT, 2004, pp:61-69 [Conf]
- Jingzhu Wang, Sylvia L. Osborn
A role-based approach to access control for XML databases. [Citation Graph (0, 0)][DBLP] SACMAT, 2004, pp:70-77 [Conf]
- Rafae Bhatti, James Joshi, Elisa Bertino, Arif Ghafoor
X-GTRBAC admin: a decentralized administration model for enterprise wide access control. [Citation Graph (0, 0)][DBLP] SACMAT, 2004, pp:78-86 [Conf]
- Axel Kern, Martin Kuhlmann, Rainer Kuropka, Andreas Ruthert
A meta model for authorisations in application security systems and their integration into RBAC administration. [Citation Graph (0, 0)][DBLP] SACMAT, 2004, pp:87-96 [Conf]
- Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce
Administrative scope in the graph-based framework. [Citation Graph (0, 0)][DBLP] SACMAT, 2004, pp:97-104 [Conf]
- Trent Jaeger, Reiner Sailer, Xiaolan Zhang
Resolving constraint conflicts. [Citation Graph (0, 0)][DBLP] SACMAT, 2004, pp:105-114 [Conf]
- Indrakshi Ray, Na Li, Robert B. France, Dae-Kyoo Kim
Using uml to visualize role-based access control constraints. [Citation Graph (0, 0)][DBLP] SACMAT, 2004, pp:115-124 [Conf]
- Elisa Bertino, Bruno Crispo, James Joshi, Wengliang (Kevin) Du, Ravi S. Sandhu
Security for grid-based computing systems issues and challenges. [Citation Graph (0, 0)][DBLP] SACMAT, 2004, pp:125- [Conf]
- Ninghui Li, Mahesh V. Tripunitara
Security analysis in role-based access control. [Citation Graph (0, 0)][DBLP] SACMAT, 2004, pp:126-135 [Conf]
- Giorgio Zanin, Luigi V. Mancini
Towards a formal model for security policies specification and validation in the selinux system. [Citation Graph (0, 0)][DBLP] SACMAT, 2004, pp:136-145 [Conf]
- Roberto Tamassia, Danfeng Yao, William H. Winsborough
Role-based cascaded delegation. [Citation Graph (0, 0)][DBLP] SACMAT, 2004, pp:146-155 [Conf]
- Nathan Dimmock, András Belokosztolszki, David M. Eyers, Jean Bacon, Ken Moody
Using trust and risk in role-based access control policies. [Citation Graph (0, 0)][DBLP] SACMAT, 2004, pp:156-162 [Conf]
- Joon S. Park, Keith P. Costello, Teresa M. Neven, Josh A. Diosomito
A composite rbac approach for large, complex organizations. [Citation Graph (0, 0)][DBLP] SACMAT, 2004, pp:163-172 [Conf]
|