-
1
-
-
84865141192
-
Role-based access control for model-driven web applications
-
Brambilla, M., Tokuda, T., Tolksdorf, R. (Eds.) LNCS Springer, Heidelberg
-
Belchior, M., Schwabe, D., Silva Parreiras, F.: Role-based access control for model-driven web applications. In: Brambilla, M., Tokuda, T., Tolksdorf, R. (Eds.) ICWE 2012. LNCS, Vol. 7387, pp. 106-120. Springer, Heidelberg (2012)
-
(2012)
ICWE 2012
, vol.7387
, pp. 106-120
-
-
Belchior, M.1
Schwabe, D.2
Silva Parreiras, F.3
-
2
-
-
33749553738
-
Role-based control of shared application views
-
UIST 2005: Proceedings of the 18th Annual ACM Symposium on User Interface Software and Technology
-
Berry, L., Bartram, L., Booth, K.S.: Role-based control of shared application views. In: 18th ACM Symposium on User Interface Software and Technology (UIST), pp. 23-32 (2005) (Pubitemid 44531218)
-
(2005)
UIST: Proceedings of the Annual ACM Symposium on User Interface Softaware and Technology
, pp. 23-32
-
-
Berry, L.1
Bartram, L.2
Booth, K.S.3
-
3
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Bertino, E., Ferraria, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security 2(1), 65-104 (1999)
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferraria, E.2
Atluri, V.3
-
4
-
-
84976720944
-
Concurrency control in groupware systems
-
Ellis, C.A., Gibbs, S.J.: Concurrency control in groupware systems. SIGMOD Record 18(2), 399-407 (1989)
-
(1989)
SIGMOD Record
, vol.18
, Issue.2
, pp. 399-407
-
-
Ellis, C.A.1
Gibbs, S.J.2
-
5
-
-
77955027607
-
A web-based collaborative metamodeling environment with secure remote model access
-
Benatallah, B., Casati, F., Kappel, G., Rossi, G. (Eds.) LNCS Springer, Heidelberg
-
Farwick, M., Agreiter, B., White, J., Forster, S., Lanzanasto, N., Breu, R.: A web-based collaborative metamodeling environment with secure remote model access. In: Benatallah, B., Casati, F., Kappel, G., Rossi, G. (Eds.) ICWE 2010. LNCS, Vol. 6189, pp. 278-291. Springer, Heidelberg (2010)
-
(2010)
ICWE 2010
, vol.6189
, pp. 278-291
-
-
Farwick, M.1
Agreiter, B.2
White, J.3
Forster, S.4
Lanzanasto, N.5
Breu, R.6
-
7
-
-
84877951841
-
Supporting entailment constraints in the context of collaborative web applications
-
Gaubatz, P., Zdun, U.: Supporting entailment constraints in the context of collaborative web applications. In: 28th Symposium on Applied Computing (2013)
-
(2013)
28th Symposium on Applied Computing
-
-
Gaubatz, P.1
Zdun, U.2
-
8
-
-
84860855974
-
Exploiting single-user web applications for shared editing: A generic transformation approach
-
Heinrich, M., Lehmann, F., Springer, T., Gaedke, M.: Exploiting single-user web applications for shared editing: a generic transformation approach. In: Proceedings of the 21st International Conference on World Wide Web, pp. 1057-1066 (2012)
-
(2012)
Proceedings of the 21st International Conference on World Wide Web
, pp. 1057-1066
-
-
Heinrich, M.1
Lehmann, F.2
Springer, T.3
Gaedke, M.4
-
9
-
-
79960160217
-
An integrated approach for identity and access management in a SOA context
-
Hummer, W., Gaubatz, P., Strembeck, M., Zdun, U., Dustdar, S.: An integrated approach for identity and access management in a SOA context. In: 16th ACM Symposium on Access Control Models and Technologies (SACMAT) (2011)
-
(2011)
16th ACM Symposium on Access Control Models and Technologies (SACMAT)
-
-
Hummer, W.1
Gaubatz, P.2
Strembeck, M.3
Zdun, U.4
Dustdar, S.5
-
10
-
-
0000206310
-
Security models for web-based applications
-
DOI 10.1145/359205.359224
-
Joshi, J.B.D., Aref, W.G., Ghafoor, A., Spafford, E.H.: Security models for web-based applications. Communications of the ACM 44(2), 38-44 (2001) (Pubitemid 33631852)
-
(2001)
Communications of the ACM
, vol.44
, Issue.2
, pp. 38-44
-
-
Joshi, J.B.D.1
Aref, W.G.2
Ghafoor, A.3
Spafford, E.H.4
-
11
-
-
77952407814
-
Organization based access control
-
Kalam, A.A.E., Benferhat, S., Miège, A., Baida, R.E., Cuppens, F., Saurel, C., Balbiani, P., Deswarte, Y., Trouessin, G.: Organization based access control. In: 4th IEEE Int. Workshop on Policies for Distributed Systems and Networks (2003)
-
(2003)
4th IEEE Int. Workshop on Policies for Distributed Systems and Networks
-
-
Kalam, A.A.E.1
Benferhat, S.2
Miège, A.3
Baida, R.E.4
Cuppens, F.5
Saurel, C.6
Balbiani, P.7
Deswarte, Y.8
Trouessin, G.9
-
12
-
-
79960242146
-
Towards user-centric cross-site personalisation
-
Auer, S., Díaz, O., Papadopoulos, G.A. (Eds.) LNCS Springer, Heidelberg
-
Koidl, K., Conlan, O., Wade, V.: Towards user-centric cross-site personalisation. In: Auer, S., Díaz, O., Papadopoulos, G.A. (Eds.) ICWE 2011. LNCS, Vol. 6757, pp. 391-394. Springer, Heidelberg (2011)
-
(2011)
ICWE 2011
, vol.6757
, pp. 391-394
-
-
Koidl, K.1
Conlan, O.2
Wade, V.3
-
13
-
-
34548010540
-
A formal approach for testing security rules
-
DOI 10.1145/1266840.1266860, SACMAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
-
Mallouli, W., Orset, J.M., Cavalli, A., Cuppens, N., Cuppens, F.: A formal approach for testing security rules. In: 12th ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 127-132. ACM (2007) (Pubitemid 47281545)
-
(2007)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, pp. 127-132
-
-
Mallouli, W.1
Orset, J.-M.2
Cavalli, A.3
Cuppens, N.4
Cuppens, F.5
-
14
-
-
0030086382
-
Role-based access control models
-
Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. Computer 29(2), 38-47 (1996)
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
15
-
-
77955250488
-
WPF apps with the model-view-viewmodel design pattern
-
Smith, J.: WPF apps with the Model-View-ViewModel design pattern. MSDN Magazine (2009)
-
(2009)
MSDN Magazine
-
-
Smith, J.1
-
16
-
-
77955045800
-
A generic proxy for secure smart card-enabled web applications
-
Benatallah, B., Casati, F., Kappel, G., Rossi, G. (Eds.) LNCS Springer, Heidelberg
-
Starnberger, G., Froihofer, L., Goeschka, K.M.: A generic proxy for secure smart card-enabled web applications. In: Benatallah, B., Casati, F., Kappel, G., Rossi, G. (Eds.) ICWE 2010. LNCS, Vol. 6189, pp. 370-384. Springer, Heidelberg (2010)
-
(2010)
ICWE 2010
, vol.6189
, pp. 370-384
-
-
Starnberger, G.1
Froihofer, L.2
Goeschka, K.M.3
-
17
-
-
77249095368
-
Scenario-driven role engineering
-
January/February
-
Strembeck, M.: Scenario-driven Role Engineering. IEEE Security & Privacy 8(1) (January/February 2010)
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.1
-
-
Strembeck, M.1
-
18
-
-
78650098860
-
Generic algorithms for consistency checking of mutual-exclusion and binding constraints in a business process context
-
Meersman, R., Dillon, T.S., Herrero, P. (Eds.) LNCS Springer, Heidelberg
-
Strembeck, M., Mendling, J.: Generic algorithms for consistency checking of mutual-exclusion and binding constraints in a business process context. In: Meersman, R., Dillon, T.S., Herrero, P. (Eds.) OTM 2010. LNCS, Vol. 6426, pp. 204-221. Springer, Heidelberg (2010)
-
(2010)
OTM 2010
, vol.6426
, pp. 204-221
-
-
Strembeck, M.1
Mendling, J.2
-
19
-
-
33846025813
-
Transparent adaptation of single-user applications for multi-user real-time collaboration
-
DOI 10.1145/1188816.1188821
-
Sun, C., Xia, S., Sun, D., Chen, D., Shen, H., Cai, W.: Transparent adaptation of single-user applications for multi-user real-time collaboration. ACM Transactions on Computer-Human Interaction 13(4), 531-582 (2006) (Pubitemid 46045662)
-
(2006)
ACM Transactions on Computer-Human Interaction
, vol.13
, Issue.4
, pp. 531-582
-
-
Sun, C.1
Xia, S.2
Sun, D.3
Chen, D.4
Shen, H.5
Cai, W.6
-
20
-
-
0348209180
-
W-RBAC - A workflow security model incorporating controlled overriding of constraints
-
December
-
Wainer, J., Barthelmes, P., Kumar, A.: W-RBAC - A Workflow Security Model Incorporating Controlled Overriding of Constraints. International Journal of Cooperative Information Systems (IJCIS) 12(4) (December 2003)
-
(2003)
International Journal of Cooperative Information Systems (IJCIS)
, vol.12
, Issue.4
-
-
Wainer, J.1
Barthelmes, P.2
Kumar, A.3
|