Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
Free Online Productivity Tools
i2Speak
i2Symbol
i2OCR
iTex2Img
iWeb2Print
iWeb2Shot
i2Type
iPdf2Split
iPdf2Merge
i2Bopomofo
i2Arabic
i2Style
i2Image
i2PDF
iLatex2Rtf
Sci2ools
30
click to vote
POLICY
2001
Springer
favorite
Email
discuss
report
113
views
Computer Networks
»
more
POLICY 2001
»
Translating Role-Based Access Control Policy within Context
14 years 3 months ago
Download
www.cl.cam.ac.uk
Jean Bacon, Michael Lloyd, Ken Moody
Real-time Traffic
Computer Networks
|
POLICY 2001
|
claim paper
Related Content
»
Reconciling role based management and role based access control
»
Towards Formal Verification of RoleBased Access Control Policies
»
Managing RoleBased Access Control Policies for Grid Databases in OGSADAI Using CAS
»
A Formal Enforcement Framework for RoleBased Access Control Using AspectOriented Programmi...
»
A Framework for RoleBased Access Control in Group Communication Systems
»
Extending Role Based Access Control Model for Distributed Multidomain Applications
»
Design of a RoleBased TrustManagement Framework
»
Criticality Aware Access Control Model for Pervasive Applications
»
The Policy Machine for Security Policy Management
more »
Post Info
More Details (n/a)
Added
30 Jul 2010
Updated
30 Jul 2010
Type
Conference
Year
2001
Where
POLICY
Authors
Jean Bacon, Michael Lloyd, Ken Moody
Comments
(0)
Researcher Info
Computer Networks Study Group
Computer Vision