Search dblp for Publications

export results for "toc:db/conf/rbac/rbac2000.bht:"

 download as .bib file

@inproceedings{DBLP:conf/rbac/AhnSKP00,
  author       = {Gail{-}Joon Ahn and
                  Ravi S. Sandhu and
                  Myong H. Kang and
                  Joon S. Park},
  editor       = {Klaus Rebensburg and
                  Charles E. Youman and
                  Vijay Atluri},
  title        = {Injecting {RBAC} to secure a Web-based workflow system},
  booktitle    = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin,
                  Germany, July 26-27, 2000},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/344287.344295},
  doi          = {10.1145/344287.344295},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rbac/AhnSKP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rbac/BertinoBF00,
  author       = {Elisa Bertino and
                  Piero A. Bonatti and
                  Elena Ferrari},
  editor       = {Klaus Rebensburg and
                  Charles E. Youman and
                  Vijay Atluri},
  title        = {{TRBAC:} a temporal role-based access control model},
  booktitle    = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin,
                  Germany, July 26-27, 2000},
  pages        = {21--30},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/344287.344298},
  doi          = {10.1145/344287.344298},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rbac/BertinoBF00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rbac/Chandramouli00,
  author       = {Ramaswamy Chandramouli},
  editor       = {Klaus Rebensburg and
                  Charles E. Youman and
                  Vijay Atluri},
  title        = {Application of {XML} tools for enterprise-wide {RBAC} implementation
                  tasks},
  booktitle    = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin,
                  Germany, July 26-27, 2000},
  pages        = {11--18},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/344287.344297},
  doi          = {10.1145/344287.344297},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rbac/Chandramouli00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rbac/GebhardtH00,
  author       = {Thomas Gebhardt and
                  Thomas Hildmann},
  editor       = {Klaus Rebensburg and
                  Charles E. Youman and
                  Vijay Atluri},
  title        = {Enabling technologies for role based online decision engines},
  booktitle    = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin,
                  Germany, July 26-27, 2000},
  pages        = {77--82},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/344287.344305},
  doi          = {10.1145/344287.344305},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rbac/GebhardtH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rbac/JaegerT00,
  author       = {Trent Jaeger and
                  Jonathon Tidswell},
  editor       = {Klaus Rebensburg and
                  Charles E. Youman and
                  Vijay Atluri},
  title        = {Rebuttal to the {NIST} {RBAC} model proposal},
  booktitle    = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin,
                  Germany, July 26-27, 2000},
  pages        = {65--66},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/344287.344302},
  doi          = {10.1145/344287.344302},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rbac/JaegerT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rbac/LongstaffLT00,
  author       = {Jim J. Longstaff and
                  Mike A. Lockyer and
                  M. G. Thick},
  editor       = {Klaus Rebensburg and
                  Charles E. Youman and
                  Vijay Atluri},
  title        = {A model of accountability, confidentiality and override for healthcare
                  and other applications},
  booktitle    = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin,
                  Germany, July 26-27, 2000},
  pages        = {71--76},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/344287.344304},
  doi          = {10.1145/344287.344304},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rbac/LongstaffLT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rbac/MonkebergR00,
  author       = {Axel M{\"{o}}nkeberg and
                  Ren{\'{e}} Rakete},
  editor       = {Klaus Rebensburg and
                  Charles E. Youman and
                  Vijay Atluri},
  title        = {Three for one: role-based access-control management in rapidly changing
                  heterogeneous environments},
  booktitle    = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin,
                  Germany, July 26-27, 2000},
  pages        = {83--88},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/344287.344306},
  doi          = {10.1145/344287.344306},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rbac/MonkebergR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rbac/NaC00,
  author       = {SangYeob Na and
                  SuhHyun Cheon},
  editor       = {Klaus Rebensburg and
                  Charles E. Youman and
                  Vijay Atluri},
  title        = {Role delegation in role-based access control},
  booktitle    = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin,
                  Germany, July 26-27, 2000},
  pages        = {39--44},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/344287.344300},
  doi          = {10.1145/344287.344300},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rbac/NaC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rbac/OsbornG00,
  author       = {Sylvia L. Osborn and
                  Yuxia Guo},
  editor       = {Klaus Rebensburg and
                  Charles E. Youman and
                  Vijay Atluri},
  title        = {Modeling users in role-based access control},
  booktitle    = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin,
                  Germany, July 26-27, 2000},
  pages        = {31--37},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/344287.344299},
  doi          = {10.1145/344287.344299},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rbac/OsbornG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rbac/Roeckle00,
  author       = {Haio Roeckle},
  editor       = {Klaus Rebensburg and
                  Charles E. Youman and
                  Vijay Atluri},
  title        = {Role-finding/role-engineering (panel session)},
  booktitle    = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin,
                  Germany, July 26-27, 2000},
  pages        = {68},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/344287.344303},
  doi          = {10.1145/344287.344303},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rbac/Roeckle00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rbac/RoeckleSW00,
  author       = {Haio Roeckle and
                  Gerhard Schimpf and
                  Rupert Weidinger},
  editor       = {Klaus Rebensburg and
                  Charles E. Youman and
                  Vijay Atluri},
  title        = {Process-oriented approach for role-finding to implement role-based
                  security administration in a large industrial organization},
  booktitle    = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin,
                  Germany, July 26-27, 2000},
  pages        = {103--110},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/344287.344308},
  doi          = {10.1145/344287.344308},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rbac/RoeckleSW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rbac/Sandhu00,
  author       = {Ravi S. Sandhu},
  editor       = {Klaus Rebensburg and
                  Charles E. Youman and
                  Vijay Atluri},
  title        = {Engineering authority and trust in cyberspace: the {OM-AM} and {RBAC}
                  way},
  booktitle    = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin,
                  Germany, July 26-27, 2000},
  pages        = {111--119},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/344287.344309},
  doi          = {10.1145/344287.344309},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rbac/Sandhu00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rbac/SandhuFK00,
  author       = {Ravi S. Sandhu and
                  David F. Ferraiolo and
                  D. Richard Kuhn},
  editor       = {Klaus Rebensburg and
                  Charles E. Youman and
                  Vijay Atluri},
  title        = {The {NIST} model for role-based access control: towards a unified
                  standard},
  booktitle    = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin,
                  Germany, July 26-27, 2000},
  pages        = {47--63},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/344287.344301},
  doi          = {10.1145/344287.344301},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rbac/SandhuFK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rbac/TidswellJ00,
  author       = {Jonathon Tidswell and
                  Trent Jaeger},
  editor       = {Klaus Rebensburg and
                  Charles E. Youman and
                  Vijay Atluri},
  title        = {Integrated constraints and inheritance in {DTAC}},
  booktitle    = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin,
                  Germany, July 26-27, 2000},
  pages        = {93--102},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/344287.344307},
  doi          = {10.1145/344287.344307},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rbac/TidswellJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/rbac/2000,
  editor       = {Klaus Rebensburg and
                  Charles E. Youman and
                  Vijay Atluri},
  title        = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin,
                  Germany, July 26-27, 2000},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/344287},
  doi          = {10.1145/344287},
  isbn         = {1-58113-259-X},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rbac/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics