-
1
-
-
33845475230
-
An introduction to role-based access control
-
"An Introduction to Role-based Access Control," NIST/ITL Bulletin, 1995.
-
(1995)
NIST/ITL Bulletin
-
-
-
2
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Aug
-
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn and R. Chandramouli, "Proposed NIST standard for role-based access control," ACM Trans. on Information and System Security (TISSEC), pp. 224-274, Aug. 2001.
-
(2001)
ACM Trans. on Information and System Security (TISSEC
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
3
-
-
0030086382
-
Role-based access control models
-
Feb
-
R. S. Sandhu, E. J. Coyne and H. L. Feinstein, C. E. Youman, "Role-Based Access Control Models," in Proc. IEEE Computer Security, vol. 29, no. 2, pp. 38-47, Feb. 1996.
-
(1996)
Proc. IEEE Computer Security
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
4
-
-
77649181757
-
How to securely break into RBAC: The BTG-RBAC model
-
Dec. 7-11
-
A. Ferreira, D. Chadwick, P. Farinha, R. Correia, Z. Gansen, R. Chilro, and L. Antunes, "How to Securely Break into RBAC: The BTG-RBAC Model," in Proc. Annual Computer Security Applications Conference, pp. 23-31, Dec. 7-11, 2009.
-
(2009)
Proc. Annual Computer Security Applications Conference
, pp. 23-31
-
-
Ferreira, A.1
Chadwick, D.2
Farinha, P.3
Correia, R.4
Gansen, Z.5
Chilro, R.6
Antunes, L.7
-
6
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
May
-
S. Osborn, R. Sandhu and Q. Munawer, "Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies," ACM Trans. on Information and System Security, vol. 3, no. 2, pp. 85-106, May 2000.
-
(2000)
ACM Trans. on Information and System Security
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.1
Sandhu, R.2
Munawer, Q.3
-
7
-
-
33845263495
-
The complexity of discretionary access control
-
Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings
-
S. Dranger, R. H. Sloan and J. A. Solworth, "The Complexity of Discretionary Access Control," in Proc. First Int. Workshop on Security (IWSEC 06), pp. 405-420, 2006. (Pubitemid 44860067)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4266
, pp. 405-420
-
-
Dranger, S.1
Sloan, R.H.2
Solworth, J.A.3
-
8
-
-
60349104471
-
Alcatraz: An isolated environment for experimenting with untrusted software
-
Jan
-
Z. Liang, W. Sun, V. N. Venkatakrishnan and R. Sekar, "Alcatraz: An Isolated Environment for Experimenting with Untrusted Software," ACM Trans. on Information and System Security (TISSEC), vol. 12, Jan. 2009.
-
(2009)
ACM Trans. on Information and System Security (TISSEC)
, vol.12
-
-
Liang, Z.1
Sun, W.2
Venkatakrishnan, V.N.3
Sekar, R.4
-
11
-
-
4143096907
-
Spatial role-based access control model for wireless networks
-
Oct. 6-9
-
F. Hansen and V. Oleshchuk, "Spatial Role-Based Access Control Model for Wireless Networks," in Proc. Fifty Eighth IEEE Vehicular Technology Conference (VTC' 03), vol. 3, pp. 2093-2097, Oct. 6-9, 2003.
-
(2003)
Proc. Fifty Eighth IEEE Vehicular Technology Conference (VTC' 03)
, vol.3
, pp. 2093-2097
-
-
Hansen, F.1
Oleshchuk, V.2
-
13
-
-
33744789667
-
LoT-RBAC: A location and time-based RBAC model
-
DOI 10.1007/11581062-27, Web Information Systems Engineering, WISE 2005 - 6th International Conference on Web Information Systems Engineering, Proceedings
-
S. M. Chandran and J. B. D. Joshi, "LoT-RBAC: A Location and Time-based RBAC Model," in Proc. Sixth Int. Conference on Web Information Systems Engineering, vol. 1995, pp. 361-375, 2005. (Pubitemid 43829645)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3806
, pp. 361-375
-
-
Chandran, S.M.1
Joshi, J.B.D.2
-
15
-
-
84944777782
-
Application-level isolation to cope with malicious database users
-
Dec. 7-11
-
S. Jajodia, P. Liu and C. D. McCollum, "Application-level isolation to cope with malicious database users," in Proc. Fourteenth Annual Computer Security Applications Conference, pp. 73-82, Dec. 7-11, 1998.
-
(1998)
Proc. Fourteenth Annual Computer Security Applications Conference
, pp. 73-82
-
-
Jajodia, S.1
Liu, P.2
McCollum, C.D.3
-
18
-
-
33144472884
-
Modeling Role-Based Access Control using Parameterized UML Models
-
D. Kim, I. Ray, R. France and N. Li, "Modeling Role-Based Access Control using Parameterized UML Models," in Proc. Fundamental Approaches to Software Engineering (FASE/ETAPS), vol. 2984, pp. 180-193, 2004.
-
(2004)
Proc. Fundamental Approaches to Software Engineering (FASE/ETAPS)
, vol.2984
, pp. 180-193
-
-
Kim, D.1
Ray, I.2
France, R.3
Li, N.4
-
19
-
-
35248863915
-
Obligations for role based access control
-
DOI 10.1109/AINAW.2007.267, 4221096, Proceedings - 21st International Conference on Advanced Information Networking and ApplicationsWorkshops/ Symposia, AINAW'07
-
G. Zhao, D. Chadwick and S. Otenko, "Obligation for Role Based Access Control," in Proc. IEEE Symposium on Security in Networks and Distributed Systems (SSNDS07),vol. 1, pp. 424-431, May 21-23, 2007. (Pubitemid 47565420)
-
(2007)
Proceedings - 21st International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINAW'07
, vol.2
, pp. 424-431
-
-
Zhao, G.1
Chadwick, D.2
Otenko, S.3
-
21
-
-
0036434226
-
Information flow analysis on role-based access control model
-
DOI 10.1108/09685220210446579
-
C. N. Zhang and C. Yang, "Information Flow Analysis on Role-Based Access Control Model," in Proc. Information Management and Computer Security, vol. 10, no. 5, pp. 225-236, 2002. (Pubitemid 35359380)
-
(2002)
Information Management and Computer Security
, vol.10
, Issue.5
, pp. 225-236
-
-
Zhang, C.N.1
Yang, C.2
-
22
-
-
0038825675
-
Task role-based access control model
-
Sept.
-
S. Oh and S. Park, "Task Role-Based Access Control Model," in Proc. Information Systems, vol. 28, no. 6, pp. 533-562, Sept. 2003.
-
(2003)
Proc. Information Systems
, vol.28
, Issue.6
, pp. 533-562
-
-
Oh, S.1
Park, S.2
-
23
-
-
24144477860
-
Representation of extended RBAC model using UML language
-
SOFSEM 2005: Theory and Practice of Computer Science - 31st Conference on Current Trends in Theory and Practice of Computer Science, Proceedings
-
A. P. Maranda, G. Goncalves and F. Hemery, "Representation of Extended RBAC Model using UML Language," ACM Trans. On Information and System Security (TISSEC), pp. 413-417, 2005. (Pubitemid 41231150)
-
(2005)
Lecture Notes in Computer Science
, vol.3381
, pp. 413-417
-
-
Poniszewska-Maranda, A.1
Goncalves, G.2
Hemery, F.3
-
24
-
-
80052096999
-
Role-based access control: A corrected and simplified specification
-
05-24, Dec.
-
Y. A. Liu and S. D. Stoller, "Role-based access control: A corrected and simplified specification," SUNY Stony Brook Univ. , Comp. Sci. Dept. , Technical Report DAR 05-24, Dec. 2005.
-
(2005)
SUNY Stony Brook Univ. , Comp. Sci. Dept. , Technical Report DAR
-
-
Liu, Y.A.1
Stoller, S.D.2
-
25
-
-
0141977659
-
Issues in the Design of a Language for Role Based Access Control
-
M. Hitchens and V. Varadharajan, "Issues in the Design of a Language for Role Based Access Control," in Proc. ICICS, pp. 22-38, 1999.
-
(1999)
Proc. ICICS
, pp. 22-38
-
-
Hitchens, M.1
Varadharajan, V.2
-
26
-
-
26444466082
-
A privacy enhanced Role-based access control model for enterprises
-
Networking and Mobile Computing: Third International Conference, ICCNMC 2005. Proceedings
-
C. Yang and C. N. Zhang, "A Privacy Enhanced Role-Based Access Control Model for Enterprises," in Proc. ICCNMC, vol. 3619, pp. 1012-1021, 2005. (Pubitemid 41435842)
-
(2005)
Lecture Notes in Computer Science
, vol.3619
, pp. 1012-1021
-
-
Yang, C.1
Zhang, C.N.2
-
28
-
-
85011571668
-
Towards a UML based approach to role engineering
-
ACM Workshop on Role-based Access Control
-
P. Epstein and R. Sandhu, "Towards A UML Based Approach to Role Engineering," in Proc. Fourth ACM Workshop on Role-based Access Control, pp. 135-143, 1999.
-
(1999)
Proc. Fourth
, pp. 135-143
-
-
Epstein, P.1
Sandhu, R.2
-
29
-
-
78650373769
-
Attribute-based encryption with break-glass
-
Springer Verlag
-
A. D. Brucker, H. Petritsch and S. G. Weber, "Attribute-based Encryption with Break-glass," in Proc. Information Security Theory and Practice (WISTP), pp. 237-244, Springer Verlag, 2010.
-
(2010)
Proc. Information Security Theory and Practice (WISTP)
, pp. 237-244
-
-
Brucker, A.D.1
Petritsch, H.2
Weber, S.G.3
-
30
-
-
33845638417
-
How to break access control in a controlled manner
-
June
-
A. Ferreira, R. Cruz, L. Antunes, P. Farinha, E. Oliveira, D. W. Chadwick and A. Costa, "How to break access control in a controlled manner," in Proc. Nineteenth IEEE Symposium on Computer-based medical Systems (CBMS' 06), pp. 847-854, June 2006.
-
(2006)
Proc. Nineteenth IEEE Symposium on Computer-based Medical Systems (CBMS' 06)
, pp. 847-854
-
-
Ferreira, A.1
Cruz, R.2
Antunes, L.3
Farinha, P.4
Oliveira, E.5
Chadwick, D.W.6
Costa, A.7
-
33
-
-
80052080369
-
Verification of integrated role-based access control model
-
S. Zafar, K. Winter, R. Colvin and R. G. Dromey, "Verification of Integrated Role-Based Access Control Model," in Proc. First Asian Working Conference on Verified Software, pp. 230-241, 2006.
-
(2006)
Proc. First Asian Working Conference on Verified Software
, pp. 230-241
-
-
Zafar, S.1
Winter, K.2
Colvin, R.3
Dromey, R.G.4
|