-
4
-
-
84948950552
-
A model for attribute-based user-role assignment
-
Al-Kahtani, M.A., Sandhu, R.: A model for attribute-based user-role assignment. In: ACSAC (2002)
-
(2002)
ACSAC
-
-
Al-Kahtani, M.A.1
Sandhu, R.2
-
5
-
-
11044234857
-
XACML profile for role based access control (RBAC)
-
OASIS February
-
Anderson, A.: XACML profile for role based access control (RBAC). Technical Report Draft 1, OASIS (February 2004)
-
(2004)
Technical Report Draft 1
-
-
Anderson, A.1
-
6
-
-
58349088722
-
A role and context based access control model with UML
-
Bao, Y., Song, J., Wang, D., Shen, D., Yu, G.: A Role and Context Based Access Control Model with UML. In: ICYCS (2008)
-
(2008)
ICYCS
-
-
Bao, Y.1
Song, J.2
Wang, D.3
Shen, D.4
Yu, G.5
-
7
-
-
38049006888
-
Implementing role based access controls using X.509 attribute certificates
-
Chadwick, D.W., Otenko, A., Ball, E.: Implementing Role Based Access Controls Using X.509 Attribute Certificates. IEEE Internet Computing (2003)
-
(2003)
IEEE Internet Computing
-
-
Chadwick, D.W.1
Otenko, A.2
Ball, E.3
-
8
-
-
33748081445
-
TrustBAC: Integrating trust relationships into the RBAC model for access control in open systems
-
Chakraborty, S., Ray, I.: TrustBAC: integrating trust relationships into the RBAC model for access control in open systems. In: SACMAT (2006)
-
(2006)
SACMAT
-
-
Chakraborty, S.1
Ray, I.2
-
9
-
-
38349010641
-
A role and attribute based access control system using semantic web technologies
-
Meersman, R., Tari, Z. (eds.) LNCS Springer, Heidelberg
-
Cirio, L., Cruz, I.F., Tamassia, R.: A Role and Attribute Based Access Control System Using Semantic Web Technologies. In: Meersman, R., Tari, Z. (eds.) OTM-WS 2007, Part II. LNCS, vol. 4806, pp. 1256-1266. Springer, Heidelberg (2007)
-
(2007)
OTM-WS 2007, Part II
, vol.4806
, pp. 1256-1266
-
-
Cirio, L.1
Cruz, I.F.2
Tamassia, R.3
-
10
-
-
0035791053
-
Securing context-aware applications using environment roles
-
Covington, M.J., Long, W., Srinivasan, S., Dev, A.K., Ahamad, M., Abowd, G.D.: Securing context-aware applications using environment roles. In: SACMAT (2001)
-
(2001)
SACMAT
-
-
Covington, M.J.1
Long, W.2
Srinivasan, S.3
Dev, A.K.4
Ahamad, M.5
Abowd, G.D.6
-
11
-
-
33845391441
-
A contextual attribute-based access control model
-
On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops - OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerS
-
Covington, M.J., Sastry, M.R.: A Contextual Attribute-Based Access Control Model. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4278, pp. 1996-2006. Springer, Heidelberg (2006) (Pubitemid 44891763)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4278 LNCS - II
, pp. 1996-2006
-
-
Covington, M.J.1
Sastry, M.R.2
-
12
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Richard Kuhn, D., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. on Infor. and Sys. Sec. (2001)
-
(2001)
ACM Trans. on Infor. and Sys. Sec.
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Richard Kuhn, D.4
Chandramouli, R.5
-
13
-
-
69949172480
-
Fine-grained access control with object-sensitive roles
-
Drossopoulou, S. (ed.) LNCS Springer, Heidelberg
-
Fischer, J., Marino, D., Majumdar, R., Millstein, T.: Fine-Grained Access Control with Object-Sensitive Roles. In: Drossopoulou, S. (ed.) ECOOP 2009. LNCS, vol. 5653, pp. 173-194. Springer, Heidelberg (2009)
-
(2009)
ECOOP 2009
, vol.5653
, pp. 173-194
-
-
Fischer, J.1
Marino, D.2
Majumdar, R.3
Millstein, T.4
-
14
-
-
79952791195
-
Relationship-based access control: Protection model and policy language
-
Fong, P.W.L.: Relationship-based access control: protection model and policy language. In: CODASPY (2011)
-
(2011)
CODASPY
-
-
Fong, P.W.L.1
-
15
-
-
80955144182
-
Roles in information security - A survey and classification of the research area
-
Fuchs, L., Pernul, G., Sandhu, R.S.: Roles in information security-A survey and classification of the research area. Computers & Security (2011)
-
(2011)
Computers & Security
-
-
Fuchs, L.1
Pernul, G.2
Sandhu, R.S.3
-
16
-
-
4243280162
-
The economic impact of role-based access control
-
NIST March
-
Gallagher, M.P., O'Connor, A.C., Kropp, B.: The economic impact of role-based access control. In: Planning report 02-1, NIST, (March 2002)
-
(2002)
Planning Report 02-1
-
-
Gallagher, M.P.1
O'Connor, A.C.2
Kropp, B.3
-
17
-
-
55849102373
-
A design for parameterized roles
-
Ge, M., Osborn, S.L.: A design for parameterized roles. In: DBSec (2004)
-
(2004)
DBSec
-
-
Ge, M.1
Osborn, S.L.2
-
19
-
-
84874312933
-
A framework integrating attribute-based policies into RBAC
-
Huang, J., Nicol, D., Bobba, R., Huh, J.H.: A Framework Integrating Attribute-based Policies into RBAC. In: SACMAT (2012)
-
(2012)
SACMAT
-
-
Huang, J.1
Nicol, D.2
Bobba, R.3
Huh, J.H.4
-
20
-
-
84873425163
-
A unified attribute-based access control model covering DAC, MAC and RBAC
-
Jin, X., Krishnan, R., Sandhu, R.: A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC. In: DBSec (2012)
-
(2012)
DBSec
-
-
Jin, X.1
Krishnan, R.2
Sandhu, R.3
-
21
-
-
77952407814
-
Organization based access control
-
Kalam, A.A.E., Benferhat, S., Miege, A., Baida, R.E., Cuppens, F., Saurel, C., Balbiani, P., Deswarte, Y., Trouessin, G.: Organization based access control. In: POLICY (2003)
-
(2003)
POLICY
-
-
Kalam, A.A.E.1
Benferhat, S.2
Miege, A.3
Baida, R.E.4
Cuppens, F.5
Saurel, C.6
Balbiani, P.7
Deswarte, Y.8
Trouessin, G.9
-
22
-
-
77952374462
-
From ABAC to ZBAC: The evolution of access control models
-
Karp, A.H., Haury, H., Davis, M.H.: From ABAC to ZBAC: the evolution of access control models, In: Tech. Report, HP Labs (2009)
-
(2009)
Tech. Report, HP Labs
-
-
Karp, A.H.1
Haury, H.2
Davis, M.H.3
-
23
-
-
77953350247
-
Adding attributes to role-based access control
-
Richard Kuhn, D., Coyne, E.J., Weil, T.R.: Adding Attributes to Role-Based Access Control. IEEE Computer 43(6), 79-81 (2010)
-
(2010)
IEEE Computer
, vol.43
, Issue.6
, pp. 79-81
-
-
Richard Kuhn, D.1
Coyne, E.J.2
Weil, T.R.3
-
24
-
-
15944413918
-
Context sensitivity in role-based access control
-
DOI 10.1145/567331.567336
-
Kumar, A., Karnik, N., Chafle, G.: Context sensitivity in role-based access control. SIGOPS Oper. Syst. Rev. 36(3), 53-66 (2002) (Pubitemid 41107669)
-
(2002)
Operating Systems Review (ACM)
, vol.36
, Issue.3
, pp. 53-66
-
-
Kumar, A.1
Karnik, N.2
Chafle, G.3
-
26
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29(2), 38-47 (1996)
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
27
-
-
71049167747
-
Towards session-aware RBAC administration and enforcement with XACML
-
Xu, M., Wijesekera, D., Zhang, X., Cooray, D.: Towards Session-Aware RBAC Administration and Enforcement with XACML. In: POLICY (2009)
-
(2009)
POLICY
-
-
Xu, M.1
Wijesekera, D.2
Zhang, X.3
Cooray, D.4
-
28
-
-
80053531749
-
Extended RBAC with role attributes
-
Yong, J., Bertino, E., Toleman, M., Roberts, D.: Extended RBAC with role attributes. In: 10th Pacific Asia Conf. on Info. Sys. (2006)
-
(2006)
10th Pacific Asia Conf. on Info. Sys.
-
-
Yong, J.1
Bertino, E.2
Toleman, M.3
Roberts, D.4
-
29
-
-
70349127457
-
ROBAC: Scalable role and organization based access control models
-
Zhang, Z., Zhang, X., Sandhu, R.: ROBAC: Scalable role and organization based access control models. In: IEEE TrustCol (2006)
-
(2006)
IEEE TrustCol
-
-
Zhang, Z.1
Zhang, X.2
Sandhu, R.3
|