Abstract is missing.
- Characteristics of role-based access controlVirgil D. Gligor. [doi]
- Prioritizing RBAC featuresEdward J. Coyne. [doi]
- Security and confidentiality in health care informaticsYahya Y. Al-Salqan, V. Juggy Jagannathan, Tad Davis, Nich Zhang, Y. V. Ramana Reddy. [doi]
- Requirements of role-based access control for collaborative systemsTrent Jaeger, Atul Prakash. [doi]
- Implementing role-based access control using object technologyJohn F. Barkley. [doi]
- A policy based role framework for access controlEmil Lupu, Damian A. Marriott, Morris Sloman, Nicholas Yialelis. [doi]
- Role-based access control in ORACLE7 and Trusted ORACLE7LouAnna Notargiacomo. [doi]
- Workshop discussionEdward J. Coyne, Charles E. Youman. [doi]
- NetWare 4 as an example of role-based access controlJeremy Epstein, Ravi S. Sandhu. [doi]
- Issues in RBACRavi S. Sandhu. [doi]
- Workshop summaryRavi S. Sandhu. [doi]
- Future directions in role-based access controlDavid F. Ferraiolo, D. Richard Kuhn. [doi]
- Role engineeringEdward J. Coyne. [doi]
- The role graph modelMatunda Nyanchama, Sylvia L. Osborn. [doi]
- Rationale for the RBAC96 family of access control modelsRavi S. Sandhu. [doi]
- Role-based access control and distributed object-based enterprise computingRoshan K. Thomas. [doi]
- Constraints for role-based access controlFang Chen, Ravi S. Sandhu. [doi]
- Role-based access control for object-oriented/C++ systemsSteven A. Demurjian, T. C. Ting, M.-Y. Hu. [doi]
- Roles versus groupsRavi S. Sandhu. [doi]
- RBAC transitionCharles E. Youman. [doi]