Author of the publication

Future Directions in Role-Based Access Control Models.

. MMM-ACNS, volume 2052 of Lecture Notes in Computer Science, page 22-26. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Issues in RBAC.. ACM Workshop on Role-Based Access Control, ACM, (1995)The RSL99 Language for Role-Based Separation of Duty Constraints., and . ACM Workshop on Role-Based Access Control, page 43-54. ACM, (1999)Separation of Duties in Computerized Information Systems.. DBSec, page 179-190. North-Holland, (1990)Polyinstantiation Integrity in Multilevel Relations Revisited., and . DBSec, page 297-308. North-Holland, (1990)Access Control: The Neglected Frontier.. ACISP, volume 1172 of Lecture Notes in Computer Science, page 219-227. Springer, (1996)Conceptual Foundations for a Model of Task-based Authorizations., and . CSFW, page 66-79. IEEE Computer Society, (1994)A New Polyinstantiation Integrity Constraint for Multilevel Relations., , and . CSFW, page 159-165. IEEE Computer Society, (1990)Speculations on the science of web user security.. Comput. Networks, 56 (18): 3891-3895 (2012)Towards a Times-Based Usage Control Model., , , and . DBSec, volume 4602 of Lecture Notes in Computer Science, page 227-242. Springer, (2007)Database Security-Concepts, Approaches, and Challenges., and . IEEE Trans. Dependable Secur. Comput., 2 (1): 2-19 (2005)