Abstract is missing.
- An administration concept for the enterprise role-based access control modelAxel Kern, Andreas Schaad, Jonathan D. Moffett. 3-11 [doi]
- The role control center: features and case studiesDavid F. Ferraiolo, Ramaswamy Chandramouli, Gail-Joon Ahn, Serban I. Gavrila. 12-20 [doi]
- Cooperative role-based administrationHorst Wedde, Mario Lischka. 21-32 [doi]
- A methodology for managing roles in legacy systemsSylvia L. Osborn, Yan Han, Jun Liu. 33-40 [doi]
- Specifying and enforcing constraints in role-based access controlJason Crampton. 43-50 [doi]
- Dependencies and separation of duty constraints in GTRBACJames Joshi, Basit Shafiq, Arif Ghafoor, Elisa Bertino. 51-64 [doi]
- An approach to engineer and enforce context constraints in an RBAC environmentGustaf Neumann, Mark Strembeck. 65-79 [doi]
- On context in authorization policyPatrick Drew McDaniel. 80-89 [doi]
- Role-based access control for collaborative enterprise in peer-to-peer computing environmentsJoon S. Park, Junseok Hwang. 93-99 [doi]
- Model driven security for process-oriented systemsDavid A. Basin, Jürgen Doser, Torsten Lodderstedt. 100-109 [doi]
- An infrastructure for managing secure update operations on XML dataElisa Bertino, Giovanni Mella, Gianluca Correndo, Elena Ferrari. 110-122 [doi]
- The tees confidentiality model: an authorisation model for identities and rolesJim J. Longstaff, Mike A. Lockyer, John Nicholas. 125-133 [doi]
- Partial outsourcing: a new paradigm for access controlJoerg Abendroth, Christian Damsgaard Jensen. 134-141 [doi]
- Induced role hierarchies with attribute-based RBACMohammad A. Al-Kahtani, Ravi S. Sandhu. 142-148 [doi]
- PBDM: a flexible delegation model in RBACXinwen Zhang, Sejong Oh, Ravi S. Sandhu. 149-157 [doi]
- Cryptographic access control in a distributed file systemAnthony Harrington, Christian Damsgaard Jensen. 158-165 [doi]
- On modeling system-centric information for role engineeringDongwan Shin, Gail-Joon Ahn, Sangrae Cho, Seunghun Jin. 169-178 [doi]
- Role mining - revealing business roles for security administration using data mining technologyMartin Kuhlmann, Dalia Shohat, Gerhard Schimpf. 179-186 [doi]
- A stratification-based approach for handling conflicts in access controlSalem Benferhat, Rania El Baida, Frédéric Cuppens. 189-195 [doi]
- Static verification of security requirements in role based CSCW systemsTanvir Ahmed, Anand R. Tripathi. 196-203 [doi]
- An access control model for dynamic client-side contentAdam Hess, Kent E. Seamons. 207-216 [doi]
- Dynamic and risk-aware network access managementLawrence Teo, Gail-Joon Ahn, Yuliang Zheng. 217-230 [doi]
- Dynamic access control: preserving safety and trust for network defense operationsPrasad Naldurg, Roy H. Campbell. 231-237 [doi]