Sciweavers

215 search results - page 10 / 43
» Role Based Access Control for UDDI Inquiries
Sort
View
TKDE
2008
177views more  TKDE 2008»
14 years 11 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
98
Voted
MMMACNS
2001
Springer
15 years 4 months ago
Future Directions in Role-Based Access Control Models
Abstract. In the past five years there has been tremendous activity in rolebased access control (RBAC) models. Consensus has been achieved on a standard core RBAC model that is in ...
Ravi S. Sandhu
ACSAC
2008
IEEE
15 years 6 months ago
Enforcing Role-Based Access Control Policies in Web Services with UML and OCL
Karsten Sohr, Tanveer Mustafa, Xinyu Bao, Gail-Joo...
80
Voted
POLICY
2001
Springer
15 years 4 months ago
Translating Role-Based Access Control Policy within Context
Jean Bacon, Michael Lloyd, Ken Moody
RBAC
1998
42views more  RBAC 1998»
15 years 1 months ago
Role and Task-Based Access Control in the PerDiS Groupware Platform
George Coulouris, Jean Dollimore, Marcus Roberts