


default search action
2. RBAC 1997: Fairfax, VA, USA
- Charles E. Youman, Edward J. Coyne, Trent Jaeger:

Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997. ACM 1997, ISBN 0-89791-985-8 - Elisa Bertino, Elena Ferrari, Vijayalakshmi Atluri:

A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems. 1-12 - Roshan K. Thomas:

Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. 13-19 - D. Richard Kuhn:

Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. 23-30 - Sylvia L. Osborn:

Mandatory access control and role-based access control revisited. 31-40 - Ravi S. Sandhu, Venkata Bhamidipati, Edward J. Coyne, Srinivas Ganta, Charles E. Youman:

The ARBAC97 model for role-based administration of roles: preliminary description and outline. 41-50 - William J. Meyers:

RBAC emulation on trusted DG/UX. 55-60 - Roland Awischus:

Role based access control with the security administration manager (SAM). 61-68 - Larry S. Bartz:

hyperDRIVE: leveraging LDAP to implement RBAC on the Web. 69-74 - David F. Ferraiolo, John F. Barkley:

Specifying and managing role-based access control within a corporate intranet. 77-82 - Christian Friberg, Achim Held:

Support for discretionary role based access control in ACL-oriented operating systems. 83-94 - Trent Jaeger, Frederique Giraud, Nayeem Islam, Jochen Liedtke:

A role-based access control model for protection domain derivation and management. 95-106 - Raymond K. Wong:

RBAC support in object-oriented role databases. 109-120 - E. B. Fernandez, J. C. Hawkins:

Determining role rights from use cases. 121-125 - John F. Barkley:

Comparing simple role based access control models and access control lists. 127-132 - Emil Lupu, Morris Sloman

:
Reconciling role based management and role based access control. 135-141 - Tor Didriksen:

Rule based database access control - a practical approach. 143-151 - Luigi Giuri, Pietro Iglio:

Role templates for content-based access control. 153-159

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














