Abstract is missing.
- A lightweight approach to specification and analysis of role-based access control extensionsAndreas Schaad, Jonathan D. Moffett. 13-22 [doi]
- An access control language for web servicesEmin Gün Sirer, Ke Wang. 23-30 [doi]
- A scenario-driven role engineering process for functional RBAC rolesGustaf Neumann, Mark Strembeck. 33-42 [doi]
- Observations on the role life-cycle in the context of enterprise security managementAxel Kern, Martin Kuhlmann, Andreas Schaad, Jonathan D. Moffett. 43-51 [doi]
- Cool security trendsDawson R. Engler, Cynthia E. Irvine, Trent Jaeger, David Wagner. 53 [doi]
- Towards usage control models: beyond traditional access controlJaehong Park, Ravi S. Sandhu. 57-64 [doi]
- A cryptographic solution to implement access control in a hierarchy and moreIndrakshi Ray, Indrajit Ray, Natu Narasimhamurthi. 65-73 [doi]
- Temporal hierarchies and inheritance semantics for GTRBACJames Joshi, Elisa Bertino, Arif Ghafoor. 74-83 [doi]
- Information sharing and security in dynamic coalitionsCharles E. Phillips, T. C. Ting, Steven A. Demurjian. 87-96 [doi]
- Models for coalition-based access control (CBAC)Eve Cohen, Roshan K. Thomas, William H. Winsborough, Deborah Shands. 97-106 [doi]
- An authorization infrastructure for nomadic computingKan Zhang, Tim Kindberg. 107-113 [doi]
- A role-based delegation framework for healthcare information systemsLonghua Zhang, Gail-Joon Ahn, Bei-tseng Chu. 125-134 [doi]
- The PERMIS X.509 role based privilege management infrastructureDavid W. Chadwick, Alexander Otenko. 135-140 [doi]
- Making access control more usableElisa Bertino, Trent Jaeger, Jonathan D. Moffett, Sylvia L. Osborn, Ravi Ravi. 141 [doi]
- Administrative scope and role hierarchy operationsJason Crampton. 145-154 [doi]
- A model for role administration using organization structureSejong Oh, Ravi S. Sandhu. 155-162 [doi]
- Information flow analysis of an RBAC systemSylvia L. Osborn. 163-168 [doi]