Abstract is missing.
- Injecting RBAC to secure a Web-based workflow systemGail-Joon Ahn, Ravi S. Sandhu, Myong H. Kang, Joon S. Park. 1-10 [doi]
- Application of XML tools for enterprise-wide RBAC implementation tasksRamaswamy Chandramouli. 11-18 [doi]
- TRBAC: a temporal role-based access control modelElisa Bertino, Piero A. Bonatti, Elena Ferrari. 21-30 [doi]
- Modeling users in role-based access controlSylvia L. Osborn, Yuxia Guo. 31-37 [doi]
- The NIST model for role-based access control: towards a unified standardRavi S. Sandhu, David F. Ferraiolo, D. Richard Kuhn. 47-63 [doi]
- Rebuttal to the NIST RBAC model proposalTrent Jaeger, Jonathon Tidswell. 65-66 [doi]
- Role-finding/role-engineering (panel session)Haio Roeckle. 68 [doi]
- A model of accountability, confidentiality and override for healthcare and other applicationsJim J. Longstaff, Mike A. Lockyer, M. G. Thick. 71-76 [doi]
- Enabling technologies for role based online decision enginesThomas Gebhardt, Thomas Hildmann. 77-82 [doi]
- Three for one: role-based access-control management in rapidly changing heterogeneous environmentsAxel Mönkeberg, René Rakete. 83-88 [doi]
- Integrated constraints and inheritance in DTACJonathon Tidswell, Trent Jaeger. 93-102 [doi]
- Process-oriented approach for role-finding to implement role-based security administration in a large industrial organizationHaio Roeckle, Gerhard Schimpf, Rupert Weidinger. 103-110 [doi]
- Engineering authority and trust in cyberspace: the OM-AM and RBAC wayRavi S. Sandhu. 111-119 [doi]