Role-based access control and role hierarchies have been the subject of considerable research in recent years. In this paper, we consider three useful applications of a new role-b...
The Role-Based Access Control (RBAC) model is traditionally used to manually assign users to appropriate roles, based on a specific enterprise policy, thereby authorizing them to ...
Most supervised language processing systems show a significant drop-off in performance when they are tested on text that comes from a domain significantly different from the domai...
: In this paper we introduce a series of reference models for Secure Role-Based Workflow systems. We build our models over the well-known RBAC96 framework. 96 model supports the no...
Rapid business changes require companies to make rapid changes in business processes and ultimately in BPS systems. These changes can be done rapidly if business modelers understan...
Pavel Balabko, Alain Wegmann, Alain Ruppen, Nicola...