-
1
-
-
0029697680
-
A security policy model for clinical information systems
-
Oakland, CA, May 6-8; IEEE
-
R. Anderson. A security policy model for clinical information systems. In Proceedings of IEEE Symposium on Security and Privacy, pages 30-45, Oakland, CA, May 6-8 1996. IEEE.
-
(1996)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 30-45
-
-
Anderson, R.1
-
2
-
-
0033650839
-
Injecting RBAC to secure a web-based workflow system
-
Gail-Joon Ahn, Ravi Sandhu, Myong Kang, and Joon Park. Injecting RBAC to secure a web-based workflow system. In Proceedings of 5th ACM Workshop on Role-Based Access Control, Berlin, Germany, July 26-27 2000. ACM.
-
Proceedings of 5th ACM Workshop on Role-Based Access Control, Berlin, Germany, July 26-27 2000. ACM
-
-
Ahn, G.1
Sandhu, R.2
Kang, M.3
Park, J.4
-
6
-
-
0034829103
-
Revocations - a classification
-
Nova Scotia, Canada, June
-
A. Hagstrom, S. Jajodia, F. P. Presicce, and D. Wijesekera. Revocations - a classification. In Proc. 14th IEEE Computer Security Foundations Workshop, pages 44-58, Nova Scotia, Canada, June 2001.
-
(2001)
Proc. 14th IEEE Computer Security Foundations Workshop
, pp. 44-58
-
-
Hagstrom, A.1
Jajodia, S.2
Presicce, F.P.3
Wijesekera, D.4
-
8
-
-
0034568606
-
Role-based access to patient clinical data: InterCare approach in the region of Crete
-
Hannover, Germany, August 27 - September 1; IOS Press
-
G. Potamias, M. Tsiknakis, D. Katehakis, E. karabela, V. Moustakis, and S. Orphanoudakis. Role-based access to patient clinical data: InterCare approach in the region of Crete. In Proceedings of MIE and CMDS 2000, pages 1074-1079, Hannover, Germany, August 27 - September 1 2000. IOS Press.
-
(2000)
Proceedings of MIE and CMDS 2000
, pp. 1074-1079
-
-
Potamias, G.1
Tsiknakis, M.2
Katehakis, D.3
Karabela, E.4
Moustakis, V.5
Orphanoudakis, S.6
-
9
-
-
79957820464
-
Role-based EAM using x.509 attribute certificate
-
Dongwan Shin, Gail-Joon Ahn, and Sangrae Cho. Role-based EAM using x.509 attribute certificate. In Proceedings of Sixteenth Annual IFIP WG 11.3 Working Conference on Data and Application Security, Cambridge, UK, July 29-31 2002. IFIP.
-
Proceedings of Sixteenth Annual IFIP WG 11.3 Working Conference on Data and Application Security, Cambridge, UK, July 29-31 2002. IFIP
-
-
Shin, D.1
Ahn, G.2
Cho, S.3
-
11
-
-
0030086382
-
Role-based access control models
-
February
-
Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, February 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
13
-
-
0002841051
-
Task-based authorization controls (TBAC): Models for active and enterprise-oriented authorization management
-
In T. Y. Lin and Xiaolei Qian, editors; North-Holland
-
Roshan Thomas and Ravi Sandhu. Task-based authorization controls (TBAC): Models for active and enterprise-oriented authorization management. In T. Y. Lin and Xiaolei Qian, editors, Database Security XI: Status and Prospects. North-Holland, 1997.
-
(1997)
Database Security XI: Status and Prospects
-
-
Thomas, R.1
Sandhu, R.2
-
14
-
-
0035790650
-
A rule-based framework for role-based delegation
-
Chantilly, VA, May 3-4; ACM
-
Longhua Zhang, Gail-Joon Ahn, and Bill Chu. A rule-based framework for role-based delegation. In Proceedings of 6th ACM Symposium on Access Control Models and Technologies, pages 153-162, Chantilly, VA, May 3-4 2001. ACM.
-
(2001)
Proceedings of 6th ACM Symposium on Access Control Models and Technologies
, pp. 153-162
-
-
Zhang, L.1
Ahn, G.-J.2
Chu, B.3
|