Sciweavers

221 search results - page 13 / 45
» Delegation in Role-Based Access Control
Sort
View
TKDE
2008
177views more  TKDE 2008»
13 years 10 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
ACSAC
2008
IEEE
14 years 5 months ago
Enforcing Role-Based Access Control Policies in Web Services with UML and OCL
Karsten Sohr, Tanveer Mustafa, Xinyu Bao, Gail-Joo...
POLICY
2001
Springer
14 years 3 months ago
Translating Role-Based Access Control Policy within Context
Jean Bacon, Michael Lloyd, Ken Moody
COMPUTER
2010
91views more  COMPUTER 2010»
13 years 11 months ago
Adding Attributes to Role-Based Access Control
D. Richard Kuhn, Edward J. Coyne, Timothy R. Weil