-
1
-
-
0031364777
-
Role-based access control with the security administration manager (SAM)
-
November
-
R. Awischus. Role-Based Access Control with the Security Administration Manager (SAM). In Proceedings of the Second ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, pages 61-68, November 1997
-
(1997)
Proceedings of the Second ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA
, pp. 61-68
-
-
Awischus, R.1
-
2
-
-
30644467930
-
Das user interface ist wunderschön.". Der benutzerzentrierte Gestaltungsprozess nach ISO 13407 in der Praxis"
-
May
-
A. Beu, A. Kern, and J. Schwagereit. "Das User Interface ist wunderschön.". Der benutzerzentrierte Gestaltungsprozess nach ISO 13407 in der Praxis. Java Magazin, pages 28-35, May 2002
-
(2002)
Java Magazin
, pp. 28-35
-
-
Beu, A.1
Kern, A.2
Schwagereit, J.3
-
5
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
August
-
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and System Security (TISSEC), 4(3):224-274, August 2001
-
(2001)
ACM Transactions on Information and System Security (TISSEC)
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
6
-
-
0242709337
-
Observations on the role life-cycle in the context of enterprise security management
-
Monterey, California, USA, June
-
A. Kern, M. Kuhlmann, A. Schaad, and J. Moffett. Observations on the Role Life-Cycle in the Context of Enterprise Security Management. In Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT 2002), Monterey, California, USA, pages 43-51, June 2002
-
(2002)
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (S ACMAT 2002)
, pp. 43-51
-
-
Kern, A.1
Kuhlmann, M.2
Schaad, A.3
Moffett, J.4
-
7
-
-
84948995558
-
Ein vorgehensmodell fur enterprise security management
-
September
-
A. Kern, M. Kuhlmann, and R. Wick. Ein Vorgehensmodell fur Enterprise Security Management. In Proceedings of the Working Conference on IT Security in Electronic Business Processes, St. Leon-Rot, Germany, September 2002
-
(2002)
Proceedings of the Working Conference on IT Security in Electronic Business Processes, St. Leon-Rot, Germany
-
-
Kern, A.1
Kuhlmann, M.2
Wick, R.3
-
9
-
-
0033646113
-
Process-oriented approach for role finding to implement role-based security administration in a large industrial organization
-
July
-
H. Röckle, G. Schimpf, and R. Weidinger. Process-Oriented Approach for Role Finding to Implement Role-Based Security Administration in a Large Industrial Organization. In Proceedings of the Fifth ACM Workshop on Role-Based Access Control, Berlin, Germany, pages 103-110, July 2000
-
(2000)
Proceedings of the Fifth ACM Workshop on Role-Based Access Control, Berlin, Germany
, pp. 103-110
-
-
Röckle, H.1
Schimpf, G.2
Weidinger, R.3
-
11
-
-
77949699652
-
Roles versus groups
-
December
-
R. Sandhu. Roles Versus Groups. In Proceedings of the First ACM Workshop on Role-Based Access Control, Gaithersburg, Maryland, USA, pages I-25-I-26, December 1995
-
(1995)
Proceedings of the First ACM Workshop on Role-Based Access Control, Gaithersburg, Maryland, USA
, pp. I25-I26
-
-
Sandhu, R.1
-
12
-
-
0030086382
-
Role-based access control models
-
February
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-Based Access Control Models. IEEE Computer, 29(2):38-47, February 1996
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
13
-
-
84964551464
-
Napoleon network application policy enforcement
-
October
-
D. Thomsen, R. O'Brien, and C. Payne. Napoleon Network Application Policy Enforcement. In Proceedings of the Fourth ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, pages 145-152, October 1999
-
(1999)
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA
, pp. 145-152
-
-
Thomsen, D.1
O'Brien, R.2
Payne, C.3
|