|
Conferences in DBLP
- Trent Jaeger, Antony Edwards, Xiaolan Zhang
Managing access control policies using access control spaces. [Citation Graph (0, 0)][DBLP] SACMAT, 2002, pp:3-12 [Conf]
- Andreas Schaad, Jonathan D. Moffett
A lightweight approach to specification and analysis of role-based access control extensions. [Citation Graph (0, 0)][DBLP] SACMAT, 2002, pp:13-22 [Conf]
- Emin Gün Sirer, Ke Wang
An access control language for web services. [Citation Graph (0, 0)][DBLP] SACMAT, 2002, pp:23-30 [Conf]
- Gustaf Neumann, Mark Strembeck
A scenario-driven role engineering process for functional RBAC roles. [Citation Graph (0, 0)][DBLP] SACMAT, 2002, pp:33-42 [Conf]
- Axel Kern, Martin Kuhlmann, Andreas Schaad, Jonathan D. Moffett
Observations on the role life-cycle in the context of enterprise security management. [Citation Graph (0, 0)][DBLP] SACMAT, 2002, pp:43-51 [Conf]
- Dawson R. Engler, Cynthia E. Irvine, Trent Jaeger, David Wagner
Cool security trends. [Citation Graph (0, 0)][DBLP] SACMAT, 2002, pp:53- [Conf]
- Jaehong Park, Ravi S. Sandhu
Towards usage control models: beyond traditional access control. [Citation Graph (0, 0)][DBLP] SACMAT, 2002, pp:57-64 [Conf]
- Indrakshi Ray, Indrajit Ray, Natu Narasimhamurthi
A cryptographic solution to implement access control in a hierarchy and more. [Citation Graph (0, 0)][DBLP] SACMAT, 2002, pp:65-73 [Conf]
- James Joshi, Elisa Bertino, Arif Ghafoor
Temporal hierarchies and inheritance semantics for GTRBAC. [Citation Graph (0, 0)][DBLP] SACMAT, 2002, pp:74-83 [Conf]
- Charles E. Phillips, T. C. Ting, Steven A. Demurjian
Information sharing and security in dynamic coalitions. [Citation Graph (0, 0)][DBLP] SACMAT, 2002, pp:87-96 [Conf]
- Eve Cohen, Roshan K. Thomas, William H. Winsborough, Deborah Shands
Models for coalition-based access control (CBAC). [Citation Graph (0, 0)][DBLP] SACMAT, 2002, pp:97-106 [Conf]
- Kan Zhang, Tim Kindberg
An authorization infrastructure for nomadic computing. [Citation Graph (0, 0)][DBLP] SACMAT, 2002, pp:107-113 [Conf]
- Marc Wilikens, Simone Feriti, Alberto Sanna, Marcelo Masera
A context-related authorization and access control method based on RBAC. [Citation Graph (0, 0)][DBLP] SACMAT, 2002, pp:117-124 [Conf]
- Longhua Zhang, Gail-Joon Ahn, Bei-tseng Chu
A role-based delegation framework for healthcare information systems. [Citation Graph (0, 0)][DBLP] SACMAT, 2002, pp:125-134 [Conf]
- David W. Chadwick, Alexander Otenko
The PERMIS X.509 role based privilege management infrastructure. [Citation Graph (0, 0)][DBLP] SACMAT, 2002, pp:135-140 [Conf]
- Elisa Bertino, Trent Jaeger, Jonathan D. Moffett, Sylvia L. Osborn, Ravi Ravi
Making access control more usable. [Citation Graph (0, 0)][DBLP] SACMAT, 2002, pp:141- [Conf]
- Jason Crampton
Administrative scope and role hierarchy operations. [Citation Graph (0, 0)][DBLP] SACMAT, 2002, pp:145-154 [Conf]
- Sejong Oh, Ravi S. Sandhu
A model for role administration using organization structure. [Citation Graph (0, 0)][DBLP] SACMAT, 2002, pp:155-162 [Conf]
- Sylvia L. Osborn
Information flow analysis of an RBAC system. [Citation Graph (0, 0)][DBLP] SACMAT, 2002, pp:163-168 [Conf]
|