Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/rbac/rbac2000.bht:"
@inproceedings{DBLP:conf/rbac/AhnSKP00, author = {Gail{-}Joon Ahn and Ravi S. Sandhu and Myong H. Kang and Joon S. Park}, editor = {Klaus Rebensburg and Charles E. Youman and Vijay Atluri}, title = {Injecting {RBAC} to secure a Web-based workflow system}, booktitle = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin, Germany, July 26-27, 2000}, pages = {1--10}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/344287.344295}, doi = {10.1145/344287.344295}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rbac/AhnSKP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rbac/BertinoBF00, author = {Elisa Bertino and Piero A. Bonatti and Elena Ferrari}, editor = {Klaus Rebensburg and Charles E. Youman and Vijay Atluri}, title = {{TRBAC:} a temporal role-based access control model}, booktitle = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin, Germany, July 26-27, 2000}, pages = {21--30}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/344287.344298}, doi = {10.1145/344287.344298}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rbac/BertinoBF00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rbac/Chandramouli00, author = {Ramaswamy Chandramouli}, editor = {Klaus Rebensburg and Charles E. Youman and Vijay Atluri}, title = {Application of {XML} tools for enterprise-wide {RBAC} implementation tasks}, booktitle = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin, Germany, July 26-27, 2000}, pages = {11--18}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/344287.344297}, doi = {10.1145/344287.344297}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rbac/Chandramouli00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rbac/GebhardtH00, author = {Thomas Gebhardt and Thomas Hildmann}, editor = {Klaus Rebensburg and Charles E. Youman and Vijay Atluri}, title = {Enabling technologies for role based online decision engines}, booktitle = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin, Germany, July 26-27, 2000}, pages = {77--82}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/344287.344305}, doi = {10.1145/344287.344305}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rbac/GebhardtH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rbac/JaegerT00, author = {Trent Jaeger and Jonathon Tidswell}, editor = {Klaus Rebensburg and Charles E. Youman and Vijay Atluri}, title = {Rebuttal to the {NIST} {RBAC} model proposal}, booktitle = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin, Germany, July 26-27, 2000}, pages = {65--66}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/344287.344302}, doi = {10.1145/344287.344302}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rbac/JaegerT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rbac/LongstaffLT00, author = {Jim J. Longstaff and Mike A. Lockyer and M. G. Thick}, editor = {Klaus Rebensburg and Charles E. Youman and Vijay Atluri}, title = {A model of accountability, confidentiality and override for healthcare and other applications}, booktitle = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin, Germany, July 26-27, 2000}, pages = {71--76}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/344287.344304}, doi = {10.1145/344287.344304}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rbac/LongstaffLT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rbac/MonkebergR00, author = {Axel M{\"{o}}nkeberg and Ren{\'{e}} Rakete}, editor = {Klaus Rebensburg and Charles E. Youman and Vijay Atluri}, title = {Three for one: role-based access-control management in rapidly changing heterogeneous environments}, booktitle = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin, Germany, July 26-27, 2000}, pages = {83--88}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/344287.344306}, doi = {10.1145/344287.344306}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rbac/MonkebergR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rbac/NaC00, author = {SangYeob Na and SuhHyun Cheon}, editor = {Klaus Rebensburg and Charles E. Youman and Vijay Atluri}, title = {Role delegation in role-based access control}, booktitle = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin, Germany, July 26-27, 2000}, pages = {39--44}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/344287.344300}, doi = {10.1145/344287.344300}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rbac/NaC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rbac/OsbornG00, author = {Sylvia L. Osborn and Yuxia Guo}, editor = {Klaus Rebensburg and Charles E. Youman and Vijay Atluri}, title = {Modeling users in role-based access control}, booktitle = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin, Germany, July 26-27, 2000}, pages = {31--37}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/344287.344299}, doi = {10.1145/344287.344299}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rbac/OsbornG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rbac/Roeckle00, author = {Haio Roeckle}, editor = {Klaus Rebensburg and Charles E. Youman and Vijay Atluri}, title = {Role-finding/role-engineering (panel session)}, booktitle = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin, Germany, July 26-27, 2000}, pages = {68}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/344287.344303}, doi = {10.1145/344287.344303}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rbac/Roeckle00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rbac/RoeckleSW00, author = {Haio Roeckle and Gerhard Schimpf and Rupert Weidinger}, editor = {Klaus Rebensburg and Charles E. Youman and Vijay Atluri}, title = {Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization}, booktitle = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin, Germany, July 26-27, 2000}, pages = {103--110}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/344287.344308}, doi = {10.1145/344287.344308}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rbac/RoeckleSW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rbac/Sandhu00, author = {Ravi S. Sandhu}, editor = {Klaus Rebensburg and Charles E. Youman and Vijay Atluri}, title = {Engineering authority and trust in cyberspace: the {OM-AM} and {RBAC} way}, booktitle = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin, Germany, July 26-27, 2000}, pages = {111--119}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/344287.344309}, doi = {10.1145/344287.344309}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rbac/Sandhu00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rbac/SandhuFK00, author = {Ravi S. Sandhu and David F. Ferraiolo and D. Richard Kuhn}, editor = {Klaus Rebensburg and Charles E. Youman and Vijay Atluri}, title = {The {NIST} model for role-based access control: towards a unified standard}, booktitle = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin, Germany, July 26-27, 2000}, pages = {47--63}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/344287.344301}, doi = {10.1145/344287.344301}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rbac/SandhuFK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rbac/TidswellJ00, author = {Jonathon Tidswell and Trent Jaeger}, editor = {Klaus Rebensburg and Charles E. Youman and Vijay Atluri}, title = {Integrated constraints and inheritance in {DTAC}}, booktitle = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin, Germany, July 26-27, 2000}, pages = {93--102}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/344287.344307}, doi = {10.1145/344287.344307}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rbac/TidswellJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/rbac/2000, editor = {Klaus Rebensburg and Charles E. Youman and Vijay Atluri}, title = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin, Germany, July 26-27, 2000}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/344287}, doi = {10.1145/344287}, isbn = {1-58113-259-X}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rbac/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.