Abstract is missing.
- RBAC on the Web by Smart CertificatesJoon S. Park, Ravi S. Sandhu. 1-9 [doi]
- Role-Based Access Control on the Web Using JavaLuigi Giuri. 11-18 [doi]
- A Framework for Implementing Role-Based Access Control Using CORBA Security ServiceKonstantin Beznosov, Yi Deng. 19-30 [doi]
- On the Increasing Importance of ConstraintsTrent Jaeger. 33-42 [doi]
- The RSL99 Language for Role-Based Separation of Duty ConstraintsGail-Joon Ahn, Ravi S. Sandhu. 43-54 [doi]
- Supporting Relationships in Access Control Using Role Based Access ControlJohn F. Barkley, Konstantin Beznosov, Jinny Uppal. 55-65 [doi]
- User s Perspectives (Panel Session)David F. Ferraiolo. 67 [doi]
- SecureFlow: A Secure Web-Enabled Workflow Management SystemWei-kuang Huang, Vijayalakshmi Atluri. 83-94 [doi]
- Managing Trust Between Collaborating Companies Using Outsourced Role Based Acces ControlThomas Hildmann, Jörg Barholdt. 105-111 [doi]
- Dynamic Rights: Safe Extensible Access ControlJonathon Tidswell, Geoffrey H. Outhred, John Potter. 113-120 [doi]
- Attribute Certification: An Enabling Technology for Delegation and Role-Based Controls in Distributed EnvironmentsJohn Linn, Magnus Nyström. 121-130 [doi]
- Products and Tools (Panel Session)David F. Ferraiolo. 131 [doi]
- Towards a UML Based Approach to Role EngineeringPete Epstein, Ravi S. Sandhu. 135-143 [doi]
- Napoleon: Network Application Policy EnvironmentD. J. Thomsen, Richard C. O Brien, Charles N. Payne. 145-152 [doi]
- The Uses of Role Hierarchies in Access ControlJonathan D. Moffett, Emil Lupu. 153-160 [doi]