5. RBAC 2000: Berlin, Germany
- Klaus Rebensburg, Charles E. Youman, Vijay Atluri:
Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000. ACM 2000, ISBN 1-58113-259-X
Session 1: Implementations
- Gail-Joon Ahn, Ravi S. Sandhu, Myong H. Kang, Joon S. Park:
Injecting RBAC to secure a Web-based workflow system. 1-10 - Ramaswamy Chandramouli:
Application of XML tools for enterprise-wide RBAC implementation tasks. 11-18
Session 2: Models
- Elisa Bertino, Piero A. Bonatti, Elena Ferrari:
TRBAC: a temporal role-based access control model. 21-30
Session 3: Unified Model for RBAC
- Ravi S. Sandhu, David F. Ferraiolo, D. Richard Kuhn:
The NIST model for role-based access control: towards a unified standard. 47-63
Session 4: Panel on Role Engineering
Session 5: Requirements
- Jim J. Longstaff, Mike A. Lockyer, M. G. Thick:
A model of accountability, confidentiality and override for healthcare and other applications. 71-76 - Thomas Gebhardt, Thomas Hildmann:
Enabling technologies for role based online decision engines. 77-82 - Axel Mönkeberg, René Rakete:
Three for one: role-based access-control management in rapidly changing heterogeneous environments. 83-88
Session 6: Panel on Integrating RBAC into Workflow and
Session 7: Role Engineering
- Haio Roeckle, Gerhard Schimpf, Rupert Weidinger:
Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. 103-110