C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
ACM Workshop on Role-Based Access Control
1995
1997
1998
2000
1995
2000
Keyphrases
Publications
2000
Jim J. Longstaff
,
Mike A. Lockyer
,
M. G. Thick
A model of accountability, confidentiality and override for healthcare and other applications.
ACM Workshop on Role-Based Access Control
(2000)
Gail-Joon Ahn
,
Ravi S. Sandhu
,
Myong H. Kang
,
Joon S. Park
Injecting RBAC to secure a Web-based workflow system.
ACM Workshop on Role-Based Access Control
(2000)
Axel Mönkeberg
,
René Rakete
Three for one: role-based access-control management in rapidly changing heterogeneous environments.
ACM Workshop on Role-Based Access Control
(2000)
Ravi S. Sandhu
Engineering authority and trust in cyberspace: the OM-AM and RBAC way.
ACM Workshop on Role-Based Access Control
(2000)
Elisa Bertino
,
Piero A. Bonatti
,
Elena Ferrari
TRBAC: a temporal role-based access control model.
ACM Workshop on Role-Based Access Control
(2000)
SangYeob Na
,
SuhHyun Cheon
Role delegation in role-based access control.
ACM Workshop on Role-Based Access Control
(2000)
Haio Roeckle
,
Gerhard Schimpf
,
Rupert Weidinger
Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization.
ACM Workshop on Role-Based Access Control
(2000)
Trent Jaeger
,
Jonathon Tidswell
Rebuttal to the NIST RBAC model proposal.
ACM Workshop on Role-Based Access Control
(2000)
Ramaswamy Chandramouli
Application of XML tools for enterprise-wide RBAC implementation tasks.
ACM Workshop on Role-Based Access Control
(2000)
Ravi S. Sandhu
,
David F. Ferraiolo
,
D. Richard Kuhn
The NIST model for role-based access control: towards a unified standard.
ACM Workshop on Role-Based Access Control
(2000)
Haio Roeckle
Role-finding/role-engineering (panel session).
ACM Workshop on Role-Based Access Control
(2000)
Jonathon Tidswell
,
Trent Jaeger
Integrated constraints and inheritance in DTAC.
ACM Workshop on Role-Based Access Control
(2000)
Sylvia L. Osborn
,
Yuxia Guo
Modeling users in role-based access control.
ACM Workshop on Role-Based Access Control
(2000)
Thomas Gebhardt
,
Thomas Hildmann
Enabling technologies for role based online decision engines.
ACM Workshop on Role-Based Access Control
(2000)
1999
John Linn
,
Magnus Nyström
Attribute Certification: An Enabling Technology for Delegation and Role-Based Controls in Distributed Environments.
ACM Workshop on Role-Based Access Control
(1999)
Thomas Hildmann
,
Jörg Barholdt
Managing Trust Between Collaborating Companies Using Outsourced Role Based Acces Control.
ACM Workshop on Role-Based Access Control
(1999)
D. J. Thomsen
,
Richard C. O'Brien
,
Charles N. Payne
Napoleon: Network Application Policy Environment.
ACM Workshop on Role-Based Access Control
(1999)
Wei-kuang Huang
,
Vijayalakshmi Atluri
SecureFlow: A Secure Web-Enabled Workflow Management System.
ACM Workshop on Role-Based Access Control
(1999)
Gail-Joon Ahn
,
Ravi S. Sandhu
The RSL99 Language for Role-Based Separation of Duty Constraints.
ACM Workshop on Role-Based Access Control
(1999)
Trent Jaeger
On the Increasing Importance of Constraints.
ACM Workshop on Role-Based Access Control
(1999)
David F. Ferraiolo
User's Perspectives (Panel Session).
ACM Workshop on Role-Based Access Control
(1999)
Jonathan D. Moffett
,
Emil Lupu
The Uses of Role Hierarchies in Access Control.
ACM Workshop on Role-Based Access Control
(1999)
Joon S. Park
,
Ravi S. Sandhu
RBAC on the Web by Smart Certificates.
ACM Workshop on Role-Based Access Control
(1999)
David F. Ferraiolo
Products and Tools (Panel Session).
ACM Workshop on Role-Based Access Control
(1999)
Pete Epstein
,
Ravi S. Sandhu
Towards a UML Based Approach to Role Engineering.
ACM Workshop on Role-Based Access Control
(1999)
Kami Brooks
Migrating to Role-Based Access Control.
ACM Workshop on Role-Based Access Control
(1999)
Jonathon Tidswell
,
Geoffrey H. Outhred
,
John Potter
Dynamic Rights: Safe Extensible Access Control.
ACM Workshop on Role-Based Access Control
(1999)
Konstantin Beznosov
,
Yi Deng
A Framework for Implementing Role-Based Access Control Using CORBA Security Service.
ACM Workshop on Role-Based Access Control
(1999)
Glenn Faden
RBAC in UNIX Administration.
ACM Workshop on Role-Based Access Control
(1999)
John F. Barkley
,
Konstantin Beznosov
,
Jinny Uppal
Supporting Relationships in Access Control Using Role Based Access Control.
ACM Workshop on Role-Based Access Control
(1999)
Luigi Giuri
Role-Based Access Control on the Web Using Java.
ACM Workshop on Role-Based Access Control
(1999)
1998
Konstantin Beznosov
Requirements for Access Control: US Healthcare Domain.
ACM Workshop on Role-Based Access Control
(1998)
D. Richard Kuhn
Role Based Access Control on MLS Systems without Kernel Changes.
ACM Workshop on Role-Based Access Control
(1998)
Luigi Giuri
Role-based Access Control in Java.
ACM Workshop on Role-Based Access Control
(1998)
George Coulouris
,
Jean Dollimore
,
Marcus Roberts
Role and Task-Based Access Control in the PerDiS Groupware Platform.
ACM Workshop on Role-Based Access Control
(1998)
Ravi S. Sandhu
,
Qamar Munawer
How to Do Discretionary Access Control Using Roles.
ACM Workshop on Role-Based Access Control
(1998)
Takeo Hamada
Role-based Access Control in Telecommunication Service Management - Dynamic Role Creation and Management in TINA Service Environment.
ACM Workshop on Role-Based Access Control
(1998)
Ravi S. Sandhu
Role Activation Hierarchies.
ACM Workshop on Role-Based Access Control
(1998)
Ravi S. Sandhu
,
Venkata Bhamidipati
An Oracle Implementation of the PRA97 Model for Permission-Role Assignment.
ACM Workshop on Role-Based Access Control
(1998)
Cheh Goh
,
Adrian Baldwin
Towards a More Complete Model of Role.
ACM Workshop on Role-Based Access Control
(1998)
Ravi S. Sandhu
,
Joon S. Park
Decentralized User-role Assignment for Web-based Intranets.
ACM Workshop on Role-Based Access Control
(1998)
Serban I. Gavrila
,
John F. Barkley
Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management.
ACM Workshop on Role-Based Access Control
(1998)
John F. Barkley
,
Anthony Cincotta
Managing Role/Permission Relationships Using Object Access Types.
ACM Workshop on Role-Based Access Control
(1998)
Jonathan D. Moffett
Control Principles and Role Hierarchies.
ACM Workshop on Role-Based Access Control
(1998)
1997
Christian Friberg
,
Achim Held
Support for discretionary role based access control in ACL-oriented operating systems.
ACM Workshop on Role-Based Access Control
(1997)
Raymond K. Wong
RBAC support in object-oriented role databases.
ACM Workshop on Role-Based Access Control
(1997)
Sylvia L. Osborn
Mandatory access control and role-based access control revisited.
ACM Workshop on Role-Based Access Control
(1997)
D. Richard Kuhn
Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems.
ACM Workshop on Role-Based Access Control
(1997)
Luigi Giuri
,
Pietro Iglio
Role templates for content-based access control.
ACM Workshop on Role-Based Access Control
(1997)
Trent Jaeger
,
Frederique Giraud
,
Nayeem Islam
,
Jochen Liedtke
A role-based access control model for protection domain derivation and management.
ACM Workshop on Role-Based Access Control
(1997)