-
1
-
-
0242487274
-
Security administration and control of corporate-wide diverse systems
-
G. Schimpf, "Security Administration and Control of Corporate-Wide Diverse Systems," in ACM SIGSAC Review, vol. 15(1), 1997.
-
(1997)
ACM SIGSAC Review
, vol.15
, Issue.1
-
-
Schimpf, G.1
-
2
-
-
0242403889
-
Security administration manager (SAM), release 2.4. Concepts and facilities
-
Systor GmbH & Co. KG, Köln, Germany
-
"Security Administration Manager (SAM), Release 2.4. Concepts and Facilities," Systor GmbH & Co. KG, Köln, Germany (1999).
-
(1999)
-
-
-
3
-
-
0003723881
-
Role theory: Concepts and research
-
New York: Robert E. Krieger Publishing Company
-
B. J. Biddle and E. J. Thomas, "Role Theory: Concepts and Research". New York: Robert E. Krieger Publishing Company, 1979.
-
(1979)
-
-
Biddle, B.J.1
Thomas, E.J.2
-
4
-
-
0002357382
-
Role-based access controls
-
D. F. Ferraiolo and R. D. Kuhn, "Role-Based Access Controls," presented at 15th NIST-NCSC National Computer Security Conference, Baltimore, MD, USA, 1992.
-
15th NIST-NCSC National Computer Security Conference, Baltimore, MD, USA, 1992
-
-
Ferraiolo, D.F.1
Kuhn, R.D.2
-
5
-
-
0031364777
-
Role-based access control with the security administration manager (SAM)
-
R. Awischus, "Role-Based Access Control with the Security Administration Manager (SAM)", presented at 2nd ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, 1997.
-
2nd ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, 1997
-
-
Awischus, R.1
-
6
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role-based Access Control Models", IEEE Computer, vol. 29(2), 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
7
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
(No. 2 Feb.)
-
R. S. Sandhu, V. Bhamidipati, and Q. Munawer, "The ARBAC97 model for role-based administration of roles", ACM Transactions on Information and System Security, Vol. 1 (No. 2 Feb.), 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.1
, Issue.2
-
-
Sandhu, R.S.1
Bhamidipati, V.2
Munawer, Q.3
-
8
-
-
0033653024
-
Three for one: Role-based access control in rapidly changing heterogeneous environments
-
A. Mökeberg and R. Rakete, "Three for One: Role-based Access Control in Rapidly Changing Heterogeneous Environments", presented at 5th ACM Workshop on Role-Based Access Control, Berlin, Germany, 2000.
-
5th ACM Workshop on Role-Based Access Control, Berlin, Germany, 2000
-
-
Mökeberg, A.1
Rakete, R.2
-
9
-
-
0033646113
-
Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization
-
H. Röckle, G. Schimpf, and R. Weidinger, "Process-Oriented Approach for Role-Finding to Implement Role-Based Security Administration in a Large Industrial Organization", presented at 5th ACM Workshop on Role-Based Access Control, Berlin, Germany, 2000.
-
5th ACM Workshop on Role-Based Access Control, Berlin, Germany, 2000
-
-
Röckle, H.1
Schimpf, G.2
Weidinger, R.3
-
11
-
-
0033652039
-
The NIST model for role-based access control: Towards a unified standard
-
R. S. Sandhu, D. F. Ferraiolo, and R. D. Kuhn, "The NIST Model for Role-Based Access Control: Towards A Unified Standard", presented at 5th ACM Workshop on Role-Based Access Control, Berlin, Germany, 2000.
-
5th ACM Workshop on Role-Based Access Control, Berlin, Germany, 2000
-
-
Sandhu, R.S.1
Ferraiolo, D.F.2
Kuhn, R.D.3
-
12
-
-
47649094419
-
Role-engineering
-
E. J. Coyne, "Role-Engineering", presented at 1st ACM Workshop on Role-Based Access Control, Gaithersburg, MD, USA, 1995.
-
1st ACM Workshop on Role-Based Access Control, Gaithersburg, MD, USA, 1995
-
-
Coyne, E.J.1
-
13
-
-
0031363895
-
Determining role rights from use cases
-
E. B. Fernandez and J. C. Hawkins, "Determining Role Rights from Use Cases", presented at 2nd Workshop on Role-Based Access Control, Fairfax, VA, USA, 1997.
-
2nd Workshop on Role-Based Access Control, Fairfax, VA, USA, 1997
-
-
Fernandez, E.B.1
Hawkins, J.C.2
-
14
-
-
0242709337
-
Observations on the role life-cycle in the context of enterprise security management
-
A. Kern and M. Kuhlmann, A. Schaad and J. Moffett, "Observations on the Role Life-Cycle in the Context of Enterprise Security Management", presented at SACMAT 2002, Monterey, CA, USA.
-
SACMAT 2002, Monterey, CA, USA
-
-
Kern, A.1
Kuhlmann, M.2
Schaad, A.3
Moffett, J.4
-
16
-
-
23544441724
-
Engineering of role/permission assignments
-
doctoral dissertation; GMU Fairfax, VA, USA
-
P.A. Epstein, "Engineering of Role/Permission Assignments" - doctoral dissertation 2002, GMU Fairfax, VA, USA.
-
(2002)
-
-
Epstein, P.A.1
-
17
-
-
0242528825
-
On the increasing importance of constraints
-
T. Jaeger, "On the Increasing Importance of Constraints", presented at 4th ACM Workshop on Role-Based Access Control, Fairfax, VA, USA, 1999.
-
4th ACM Workshop on Role-Based Access Control, Fairfax, VA, USA, 1999
-
-
Jaeger, T.1
-
19
-
-
0037803807
-
Techniques of cluster algorithms in data mining
-
IBM Informationssysteme GmbH, December 10
-
J. Grabmeyer and A. Rudolph, "Techniques of Cluster Algorithms in Data Mining", IBM Informationssysteme GmbH, December 10, 1998.
-
(1998)
-
-
Grabmeyer, J.1
Rudolph, A.2
-
22
-
-
23544470096
-
Rollen-Engineering im IT-Berechtigungsmanagement
-
KES Zeitschrift für Kommunikations- und EDV Sicherheit 5/00
-
H. Röckle and G. Schimpf, "Rollen-Engineering im IT-Berechtigungsmanagement" KES Zeitschrift für Kommunikations- und EDV Sicherheit 5/00, 2000.
-
(2000)
-
-
Röckle, H.1
Schimpf, G.2
|