-
1
-
-
84949261417
-
A framework for defining an access control service for healthcare information system using roles
-
Fairfax VA, October 28-29
-
Ramaswamy Chandramouli, A Framework for defining an Access Control Service for Healthcare Information System Using Roles, A Presentations for 4th ACM Workshop on Role-Based Access Control, Fairfax VA, October 28-29, 1999
-
(1999)
A Presentations for 4th ACM Workshop on Role-Based Access Control
-
-
Ramaswamy Chandramouli1
-
2
-
-
84964551464
-
Napoleon network application policy environment
-
Fairfax VA, October 28-29
-
D. Thomsen, R. O'Brien, and C. Payne, Napoleon Network Application Policy Environment, In Proceedings of 4th ACM Workshop on Role-Based Access Control, pages 145-152, Fairfax VA, October 28-29, 1999
-
(1999)
Proceedings of 4th ACM Workshop on Role-Based Access Control
, pp. 145-152
-
-
Thomsen, D.1
O'Brien, R.2
Payne, C.3
-
3
-
-
77952749389
-
Secureflow: A secure webenabled workflow management system
-
Fairfax, VA October 28-29
-
Wei-Kuang Huang, Vijayalakshmi Alturi, Secureflow: A Secure Webenabled Workflow Management System, In Proceedings of 4th ACM Workshop on Role-Based Access Control, pages 83-94, Fairfax, VA October 28-29, 1999
-
(1999)
Proceedings of 4th ACM Workshop on Role-Based Access Control
, pp. 83-94
-
-
Huang, W.-K.1
Alturi, V.2
-
4
-
-
84982871639
-
Role based access control framework for network enterprises
-
Phoenix, AZ, December 7-11
-
Dan Thomsen, Dick O'Brien, Jessica Bogle. Role Based Access Control Framework for Network Enterprises, In Proceedings of 14th Annual Computer Security Application Conference, pages 50-58, Phoenix, AZ, December 7-11, 1998
-
(1998)
Proceedings of 14th Annual Computer Security Application Conference
, pp. 50-58
-
-
Thomsen, D.1
O'Brien, D.2
Bogle, J.3
-
5
-
-
47649094419
-
Role engineering
-
Gaithersburg, MD, November 30-December 1
-
Edward Coyne. Role Engineering, In Proceedings of First ACM Workshop on Role-Based Access Control, pages I-15-I-16, Gaithersburg, MD, November 30-December 1, 1995
-
(1995)
Proceedings of First ACM Workshop on Role-Based Access Control
, pp. 115-116
-
-
Coyne, E.1
-
6
-
-
0030086382
-
Role-based access control models
-
February
-
Ravi Sandhu, Edward Coyne, Hal Feinstein, CharlesYouman, Role-Based Access Control Models, In IEEE Computer, Volume 29, Number 2, February 1996, pages 38-47
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Charles Youman4
-
8
-
-
19344364618
-
Role-based access control
-
Academic Press
-
Ravi Sandhu, Role-Based Access Control, In Advances in Computers, Vol. 46, Academic Press , 1998
-
(1998)
Advances in Computers
, vol.46
-
-
Sandhu, R.1
-
9
-
-
0029423138
-
Implementing role-based access control using object technology
-
Gaithersburg, MD, November 30-December 1
-
John Barkley. Implementing Role-Based Access Control Using Object Technology, In Proceedings of First ACM Workshop on Role-Based Access Control, pages II-93-II-98, Gaithersburg, MD, November 30-December 1, 1995
-
(1995)
Proceedings of First ACM Workshop on Role-Based Access Control
, pp. 1193-1198
-
-
Barkley, J.1
-
11
-
-
0033646113
-
Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization
-
July 26-27
-
Haio Roeckle, Gerhard Schimpf, Rupert Weidinger, Process-Oriented Approach for Role-Finding to Implement Role-Based Security Administration in a Large Industrial Organization, In Proceedings of Fifth ACM Workshop on Role-Based Access Control, pages 103-116, July 26-27, 2000
-
(2000)
Proceedings of Fifth ACM Workshop on Role-Based Access Control
, pp. 103-116
-
-
Roeckle, H.1
Schimpf, G.2
Weidinger, R.3
|