9 papers:
SAC-2015-RaniseTV #analysis #automation #constraints #policy- Automated analysis of RBAC policies with temporal constraints and static role hierarchies (SR, ATT, LV), pp. 2177–2184.
SEKE-2014-PereiraRA #sequence- Extending RBAC Model to Control Sequences of CRUD Expressions (ÓMP, DDR, RLA), pp. 463–469.
SAC-2013-Schefer-WenzlS #information management #policy- Generic support for RBAC break-glass policies in process-aware information systems (SSW, MS), pp. 1441–1446.
SEKE-2011-KimLZKLS #approach #configuration management #modelling #privacy- A Feature-Based Modeling Approach to Configuring Privacy and Temporality in RBAC (SK, YTL, YZ, DKK, LL, VS), pp. 666–671.
TACAS-2009-GofmanLSZYS #analysis #data access #named #policy- RBAC-PAT: A Policy Analysis Tool for Role Based Access Control (MIG, RL, ACS, YZ, PY, SDS), pp. 46–49.
ICEIS-J-2009-MuellerTZ #architecture #multi #scalability- A Scalable Parametric-RBAC Architecture for the Propagation of a Multi-modality, Multi-resource Informatics System (RM, VAT, GQZ), pp. 114–124.
ICALP-v2-2006-JagadeesanJPR #data access #named #programming- λ-RBAC: Programming with Role-Based Access Control (RJ, AJ, CP, JR), pp. 456–467.
EDOC-2006-SunMY #approach #flexibility #novel #workflow- A Novel Approach for Role Hierarchies in Flexible RBAC Workflow (YS, XM, FY), pp. 488–491.
WICSA-2001-ZhangY #distributed #object-oriented- An Object-Oriented RBAC Model for Distributed System (CNZ, CY), p. 24–?.