9 papers:
- SAC-2015-RaniseTV #analysis #automation #constraints #policy
- Automated analysis of RBAC policies with temporal constraints and static role hierarchies (SR, ATT, LV), pp. 2177–2184.
- SEKE-2014-PereiraRA #sequence
- Extending RBAC Model to Control Sequences of CRUD Expressions (ÓMP, DDR, RLA), pp. 463–469.
- SAC-2013-Schefer-WenzlS #information management #policy
- Generic support for RBAC break-glass policies in process-aware information systems (SSW, MS), pp. 1441–1446.
- SEKE-2011-KimLZKLS #approach #configuration management #modelling #privacy
- A Feature-Based Modeling Approach to Configuring Privacy and Temporality in RBAC (SK, YTL, YZ, DKK, LL, VS), pp. 666–671.
- TACAS-2009-GofmanLSZYS #analysis #data access #named #policy
- RBAC-PAT: A Policy Analysis Tool for Role Based Access Control (MIG, RL, ACS, YZ, PY, SDS), pp. 46–49.
- ICEIS-J-2009-MuellerTZ #architecture #multi #scalability
- A Scalable Parametric-RBAC Architecture for the Propagation of a Multi-modality, Multi-resource Informatics System (RM, VAT, GQZ), pp. 114–124.
- ICALP-v2-2006-JagadeesanJPR #data access #named #programming
- λ-RBAC: Programming with Role-Based Access Control (RJ, AJ, CP, JR), pp. 456–467.
- EDOC-2006-SunMY #approach #flexibility #novel #workflow
- A Novel Approach for Role Hierarchies in Flexible RBAC Workflow (YS, XM, FY), pp. 488–491.
- WICSA-2001-ZhangY #distributed #object-oriented
- An Object-Oriented RBAC Model for Distributed System (CNZ, CY), p. 24–?.