|
Conferences in DBLP
Fast exact and heuristic methods for role minimization problems. [Citation Graph (, )][DBLP]
Migrating to optimal RBAC with minimal perturbation. [Citation Graph (, )][DBLP]
Mining roles with semantic meanings. [Citation Graph (, )][DBLP]
Delegation and satisfiability in workflow systems. [Citation Graph (, )][DBLP]
Enforcing security properties in task-based systems. [Citation Graph (, )][DBLP]
Task-based entailment constraints for basic workflow patterns. [Citation Graph (, )][DBLP]
Panel on role engineering. [Citation Graph (, )][DBLP]
Authorization recycling in RBAC systems. [Citation Graph (, )][DBLP]
ROWLBAC: representing role based access control in OWL. [Citation Graph (, )][DBLP]
UAQ: a framework for user authorization query processing in RBAC extended with hybrid hierarchy and constraints. [Citation Graph (, )][DBLP]
RBAC administration in distributed systems. [Citation Graph (, )][DBLP]
Policy decomposition for collaborative access control. [Citation Graph (, )][DBLP]
Context-aware role-based access control in pervasive computing systems. [Citation Graph (, )][DBLP]
A general obligation model and continuity: enhanced policy enforcement engine for usage control. [Citation Graph (, )][DBLP]
An obligation model bridging access control policies and privacy policies. [Citation Graph (, )][DBLP]
Access control by action control. [Citation Graph (, )][DBLP]
A meta model for access control: why is it needed and is it even possible to achieve? [Citation Graph (, )][DBLP]
Measuring integrity on mobile phone systems. [Citation Graph (, )][DBLP]
Visualization based policy analysis: case study in SELinux. [Citation Graph (, )][DBLP]
Model-based behavioral attestation. [Citation Graph (, )][DBLP]
Detecting and resolving policy misconfigurations in access-control systems. [Citation Graph (, )][DBLP]
Enabling verification and conformance testing for access control model. [Citation Graph (, )][DBLP]
|