Abstract is missing.
- A logical specification for usage controlXinwen Zhang, Jaehong Park, Francesco Parisi-Presicce, Ravi S. Sandhu. 1-10 [doi]
- Implementing access control to people location informationUrs Hengartner, Peter Steenkiste. 11-20 [doi]
- Role-based access control in ambient and remote spaceHorst Wedde, Mario Lischka. 21-30 [doi]
- Towards a credential-based implementation of compound access control policiesJoachim Biskup, Sandra Wortmann. 31-40 [doi]
- Succinct specifications of portable document access policiesMarina Bykova, Mikhail J. Atallah. 41-50 [doi]
- On the role of roles: from role-based to role-sensitive access controlXuhui Ao, Naftaly H. Minsky. 51-60 [doi]
- Specifying access control policies for XML documents with XPathIrini Fundulaki, Maarten Marx. 61-69 [doi]
- A role-based approach to access control for XML databasesJingzhu Wang, Sylvia L. Osborn. 70-77 [doi]
- X-GTRBAC admin: a decentralized administration model for enterprise wide access controlRafae Bhatti, James Joshi, Elisa Bertino, Arif Ghafoor. 78-86 [doi]
- A meta model for authorisations in application security systems and their integration into RBAC administrationAxel Kern, Martin Kuhlmann, Rainer Kuropka, Andreas Ruthert. 87-96 [doi]
- Administrative scope in the graph-based frameworkManuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce. 97-104 [doi]
- Resolving constraint conflictsTrent Jaeger, Reiner Sailer, Xiaolan Zhang. 105-114 [doi]
- Using uml to visualize role-based access control constraintsIndrakshi Ray, Na Li, Robert B. France, Dae-Kyoo Kim. 115-124 [doi]
- Security for grid-based computing systems issues and challengesElisa Bertino, Bruno Crispo, James Joshi, Wengliang (Kevin) Du, Ravi S. Sandhu. 125 [doi]
- Security analysis in role-based access controlNinghui Li, Mahesh V. Tripunitara. 126-135 [doi]
- Towards a formal model for security policies specification and validation in the selinux systemGiorgio Zanin, Luigi V. Mancini. 136-145 [doi]
- Role-based cascaded delegationRoberto Tamassia, Danfeng Yao, William H. Winsborough. 146-155 [doi]
- Using trust and risk in role-based access control policiesNathan Dimmock, AndrĂ¡s Belokosztolszki, David M. Eyers, Jean Bacon, Ken Moody. 156-162 [doi]
- A composite rbac approach for large, complex organizationsJoon S. Park, Keith P. Costello, Teresa M. Neven, Josh A. Diosomito. 163-172 [doi]