-
1
-
-
34548028664
-
-
E. J. Coyne. Role engineering. In RBAC '95: Proceedings of the first ACM Workshop on Role-based access control, pages 4-5, New York, NY, USA, 1995. ACM Press.
-
E. J. Coyne. Role engineering. In RBAC '95: Proceedings of the first ACM Workshop on Role-based access control, pages 4-5, New York, NY, USA, 1995. ACM Press.
-
-
-
-
2
-
-
0031363895
-
Determining role rights from use cases
-
New York, NY, USA, ACM Press
-
E. B. Fernandez and J. C. Hawkins. Determining role rights from use cases. In RBAC '97: Proceedings of the second ACM workshop on Role-based access control, pages 121-125, New York, NY, USA, 1997. ACM Press.
-
(1997)
RBAC '97: Proceedings of the second ACM workshop on Role-based access control
, pp. 121-125
-
-
Fernandez, E.B.1
Hawkins, J.C.2
-
3
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
D. F. Ferraiolo, R. S. Sandhu, S. I. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security (TISSEC), 4(3):224-274, 2001.
-
(2001)
ACM Transactions on Information and System Security (TISSEC)
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.S.2
Gavrila, S.I.3
Kuhn, D.R.4
Chandramouli, R.5
-
4
-
-
0242709337
-
Observations on the role life-cycle in the context of enterprise security management
-
New York, NY, USA, ACM Press
-
A. Kern, M. Kuhlmann, A. Schaad, and J. Moffett. Observations on the role life-cycle in the context of enterprise security management. In SACMAT '02: Proceedings of the seventh ACM symposium on Access control models and technologies, pages 43-51, New York, NY, USA, 2002. ACM Press.
-
(2002)
SACMAT '02: Proceedings of the seventh ACM symposium on Access control models and technologies
, pp. 43-51
-
-
Kern, A.1
Kuhlmann, M.2
Schaad, A.3
Moffett, J.4
-
5
-
-
0242625194
-
Role mining -revealing business roles for security administration using data mining technology
-
New York, NY, USA, ACM Press
-
M. Kuhlmann, D. Shohat, and G. Schimpf. Role mining -revealing business roles for security administration using data mining technology. In SACMAT 03: Proceedings of the eighth ACM symposium on Access control models and technologies, pages 179-186, New York, NY, USA, 2003. ACM Press.
-
(2003)
SACMAT 03: Proceedings of the eighth ACM symposium on Access control models and technologies
, pp. 179-186
-
-
Kuhlmann, M.1
Shohat, D.2
Schimpf, G.3
-
6
-
-
0242709332
-
A scenario-driven role engineering process for functional RBAC roles
-
New York, NY, USA, ACM Press
-
G. Neumann and M. Strembeck. A scenario-driven role engineering process for functional RBAC roles. In SACMAT '02: Proceedings of the seventh ACM symposium on Access control models and technologies, pages 33-42, New York, NY, USA, 2002. ACM Press.
-
(2002)
SACMAT '02: Proceedings of the seventh ACM symposium on Access control models and technologies
, pp. 33-42
-
-
Neumann, G.1
Strembeck, M.2
-
7
-
-
0033646113
-
Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization
-
New York, NY, USA, ACM Press
-
H. Roeckle, G. Schimpf, and R. Weidinger. Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. In RBAC '00: Proceedings of the fifth ACM workshop on Role-based access control, pages 103-110, New York, NY, USA, 2000. ACM Press.
-
(2000)
RBAC '00: Proceedings of the fifth ACM workshop on Role-based access control
, pp. 103-110
-
-
Roeckle, H.1
Schimpf, G.2
Weidinger, R.3
-
8
-
-
0038967795
-
Role-based access control and the access control matrix
-
G. Saunders, M. Hitchens, and V. Varadharajan. Role-based access control and the access control matrix. SIGOPS Operating Systems Review, 35(4):6-20, 2001.
-
(2001)
SIGOPS Operating Systems Review
, vol.35
, Issue.4
, pp. 6-20
-
-
Saunders, G.1
Hitchens, M.2
Varadharajan, V.3
-
9
-
-
30644478631
-
Role mining with ORCA
-
New York, NY, USA, ACM Press
-
J. Schlegelmilch and U. Steffens. Role mining with ORCA. In SACMAT '05: Proceedings of the tenth ACM symposium on Access control models and technologies, pages 168-176, New York, NY, USA, 2005. ACM Press.
-
(2005)
SACMAT '05: Proceedings of the tenth ACM symposium on Access control models and technologies
, pp. 168-176
-
-
Schlegelmilch, J.1
Steffens, U.2
-
10
-
-
34547237958
-
Roleminer: Mining roles using subset enumeration
-
New York, NY, USA, ACM Press
-
J. Vaidya, V. Atluri, and J. Warner. Roleminer: Mining roles using subset enumeration. In CCS '06: Proceedings of the 13th ACM Conference on Computer and Communications Security, New York, NY, USA, 2006. ACM Press.
-
(2006)
CCS '06: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
-
Vaidya, J.1
Atluri, V.2
Warner, J.3
|