


default search action
5. RBAC 2000: Berlin, Germany
- Klaus Rebensburg, Charles E. Youman, Vijay Atluri:

Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000. ACM 2000, ISBN 1-58113-259-X
Session 1: Implementations
- Gail-Joon Ahn

, Ravi S. Sandhu, Myong H. Kang, Joon S. Park:
Injecting RBAC to secure a Web-based workflow system. 1-10 - Ramaswamy Chandramouli

:
Application of XML tools for enterprise-wide RBAC implementation tasks. 11-18
Session 2: Models
- Elisa Bertino, Piero A. Bonatti, Elena Ferrari:

TRBAC: a temporal role-based access control model. 21-30 - Sylvia L. Osborn, Yuxia Guo:

Modeling users in role-based access control. 31-37 - SangYeob Na, SuhHyun Cheon:

Role delegation in role-based access control. 39-44
Session 3: Unified Model for RBAC
- Ravi S. Sandhu, David F. Ferraiolo, D. Richard Kuhn:

The NIST model for role-based access control: towards a unified standard. 47-63 - Trent Jaeger, Jonathon Tidswell:

Rebuttal to the NIST RBAC model proposal. 65-66
Session 4: Panel on Role Engineering
- Haio Roeckle:

Role-finding/role-engineering (panel session). 68
Session 5: Requirements
- Jim J. Longstaff, Mike A. Lockyer, M. G. Thick:

A model of accountability, confidentiality and override for healthcare and other applications. 71-76 - Thomas Gebhardt, Thomas Hildmann:

Enabling technologies for role based online decision engines. 77-82 - Axel Mönkeberg, René Rakete:

Three for one: role-based access-control management in rapidly changing heterogeneous environments. 83-88
Session 6: Panel on Integrating RBAC into Workflow and
Session 7: Role Engineering
- Jonathon Tidswell, Trent Jaeger:

Integrated constraints and inheritance in DTAC. 93-102 - Haio Roeckle, Gerhard Schimpf, Rupert Weidinger:

Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. 103-110 - Ravi S. Sandhu:

Engineering authority and trust in cyberspace: the OM-AM and RBAC way. 111-119

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














