Author of the publication

POSTER: Security Enhanced Administrative Role Based Access Control Models.

, and . ACM Conference on Computer and Communications Security, page 1802-1804. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Role-Based Workflow Models., and . DBSec, volume 215 of IFIP Conference Proceedings, page 45-58. Kluwer, (2001)Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management., and . DBSec, volume 113 of IFIP Conference Proceedings, page 166-181. Chapman & Hall, (1997)IEEE Internet Computing: Guest Editor's Introduction - The Technology of Trust.. IEEE Distributed Systems Online, (2002)Implementing transaction control expressions by checking for absence of access rights., and . ACSAC, page 131-140. IEEE, (1992)Update semantics for multilevel relations., , and . ACSAC, page 103-112. IEEE, (1990)Expressive power of the single-object typed access matrix model., and . ACSAC, page 184-194. IEEE, (1993)The RSL99 Language for Role-Based Separation of Duty Constraints., and . ACM Workshop on Role-Based Access Control, page 43-54. ACM, (1999)Issues in RBAC.. ACM Workshop on Role-Based Access Control, ACM, (1995)Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture., and . ESORICS, volume 875 of Lecture Notes in Computer Science, page 403-428. Springer, (1994)Speculations on the science of web user security.. Comput. Networks, 56 (18): 3891-3895 (2012)