-
1
-
-
84964902456
-
-
Ph.D Institute for Information Processing and Microprocessor Technology, Johannes Kepler University (JKU)
-
M. A. Habib, "Secure RBAC with Dynamic, Efficient, & Usable DSD," Ph.D Institute for Information Processing and Microprocessor Technology, Johannes Kepler University (JKU), 2011.
-
(2011)
Secure RBAC with Dynamic, Efficient, & Usable DSD
-
-
Habib, M.A.1
-
2
-
-
84964822683
-
RBAC architectural design issues in institutions collaborative environment
-
M. U. Aftab, A. Nisar, M. Asif, A. Ashraf, and B. Gill, "RBAC Architectural Design Issues in Institutions Collaborative Environment," International Journal of Computer Science Issues, vol. 10, pp. 216-221, 2013.
-
(2013)
International Journal of Computer Science Issues
, vol.10
, pp. 216-221
-
-
Aftab, M.U.1
Nisar, A.2
Asif, M.3
Ashraf, A.4
Gill, B.5
-
6
-
-
77953350247
-
Adding attributes to role-based access control
-
R. Kuhn, E. J. Coyne, and T. R. Weil, "Adding attributes to role-based access control," Computer, vol. 43, pp. 79-81, 2010.
-
(2010)
Computer
, vol.43
, pp. 79-81
-
-
Kuhn, R.1
Coyne, E.J.2
Weil, T.R.3
-
7
-
-
84893561510
-
Guide to Attribute Based Access Control (ABAC) Definition and Considerations
-
H. Vincent, D. Ferraiolo, R. Kuhn, A. Schnitzer, K. Sandlin, R. Miller, et al., "Guide to Attribute Based Access Control (ABAC) Definition and Considerations," NIST Special Publication, vol. 800, p. 162, 2014.
-
(2014)
NIST Special Publication
, vol.800
, pp. 162
-
-
Vincent, H.1
Ferraiolo, D.2
Kuhn, R.3
Schnitzer, A.4
Sandlin, K.5
Miller, R.6
-
8
-
-
84864355928
-
A unified attribute-based access control model covering DAC, MAC and RBAC
-
ed: Springer
-
X. Jin, R. Krishnan, and R. Sandhu, "A unified attribute-based access control model covering DAC, MAC and RBAC," in Data and applications security and privacy, ed: Springer, 2012, pp. 41-55.
-
(2012)
Data and Applications Security and Privacy
, pp. 41-55
-
-
Jin, X.1
Krishnan, R.2
Sandhu, R.3
-
9
-
-
80052089327
-
Advantages of a non-technical XACML notation in role-based models
-
B. Stepien, S. Matwin, and A. Felty, "Advantages of a non-technical XACML notation in role-based models," in Ninth Annual International Conference on Privacy, Security and Trust (PST), 2011, pp. 193-200.
-
(2011)
Ninth Annual International Conference on Privacy, Security and Trust (PST)
, pp. 193-200
-
-
Stepien, B.1
Matwin, S.2
Felty, A.3
-
10
-
-
84923927975
-
Attributebased access control
-
V. C. Hu, R. Kuhn, and D. Ferraiolo, "Attributebased access control," IEEE Computer Society, pp. 85-88, 2015.
-
(2015)
IEEE Computer Society
, pp. 85-88
-
-
Hu, V.C.1
Kuhn, R.2
Ferraiolo, D.3
-
12
-
-
0030086382
-
Role-based access control models
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, "Role-based access control models," IEEE Computer, vol. 29, pp. 38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
13
-
-
84994391858
-
Role-based access control on the web
-
J. S. Park, R. Sandhu, and G.-J. Ahn, "Role-based access control on the web," ACM Transactions on Information and System Security (TISSEC), vol. 4, pp. 37-71, 2001.
-
(2001)
ACM Transactions on Information and System Security (TISSEC)
, vol.4
, pp. 37-71
-
-
Park, J.S.1
Sandhu, R.2
Ahn, G.-J.3
-
15
-
-
84904381291
-
Comparative analysis of Role Base and Attribute Base Access Control Model in Semantic Web
-
S. Verma, M. Singh, and S. Kumar, "Comparative analysis of Role Base and Attribute Base Access Control Model in Semantic Web," International Journal of Computer Applications, vol. 46, 2012.
-
(2012)
International Journal of Computer Applications
, vol.46
-
-
Verma, S.1
Singh, M.2
Kumar, S.3
-
16
-
-
70349852260
-
RBAC schema verification using lightweight formal model and constraint analysis
-
Submitted to
-
J. Zao, H. Wee, J. Chu, and D. Jackson, "RBAC schema verification using lightweight formal model and constraint analysis," Submitted to SACMAT, 2003.
-
(2003)
SACMAT
-
-
Zao, J.1
Wee, H.2
Chu, J.3
Jackson, D.4
|