ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Role-Based Access Control Constraints and Object Constraint Language
Access Control Management in Cloud Environments
◽
10.1007/978-3-030-31729-4_7
◽
2020
◽
pp. 141-158
Author(s):
Hua Wang
◽
Jinli Cao
◽
Yanchun Zhang
Keyword(s):
Access Control
◽
Role Based Access Control
◽
Control Constraints
◽
Object Constraint Language
◽
Constraint Language
◽
Role Based
Download Full-text
Related Documents
Cited By
References
Using uml to visualize role-based access control constraints
Proceedings of the ninth ACM symposium on Access control models and technologies - SACMAT '04
◽
10.1145/990036.990054
◽
2004
◽
Cited By ~ 44
Author(s):
Indrakshi Ray
◽
Na Li
◽
Robert France
◽
Dae-Kyoo Kim
Keyword(s):
Access Control
◽
Role Based Access Control
◽
Control Constraints
◽
Role Based
Download Full-text
Modifiedhierarchical privacy-aware role based access control model
Proceedings of the 2012 ACM Research in Applied Computation Symposium on - RACS '12
◽
10.1145/2401603.2401679
◽
2012
◽
Cited By ~ 2
Author(s):
Sanjeev Arora
◽
Eunjee Song
◽
Yoonjeong Kim
Keyword(s):
Access Control
◽
Control Model
◽
Role Based Access Control
◽
Access Control Model
◽
Role Based
Download Full-text
Solving some optimization tasks of assigning roles within the framework of well-known estimates of relative damage from leakage of authority in a role-based access control model
2019 Dynamics of Systems, Mechanisms and Machines (Dynamics)
◽
10.1109/dynamics47113.2019.8944724
◽
2019
◽
Author(s):
Sergey V. Usov
◽
Anton N. Mironenko
Keyword(s):
Access Control
◽
Control Model
◽
Role Based Access Control
◽
Access Control Model
◽
Relative Damage
◽
Role Based
Download Full-text
A web application system development platform based on role-based access control model
2010 International Conference on Computer Application and System Modeling (ICCASM 2010)
◽
10.1109/iccasm.2010.5622116
◽
2010
◽
Author(s):
Ma Xiao-jun
◽
Yan Xi
Keyword(s):
Access Control
◽
Web Application
◽
System Development
◽
Control Model
◽
Role Based Access Control
◽
Access Control Model
◽
Application System
◽
Development Platform
◽
Web Application System
◽
Role Based
Download Full-text
Role-based authorization constraints specification using Object Constraint Language
Proceedings Tenth IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. WET ICE 2001
◽
10.1109/enabl.2001.953406
◽
2002
◽
Cited By ~ 3
Author(s):
Gail-Joon Ahn
◽
M.E. Shin
Keyword(s):
Object Constraint Language
◽
Constraint Language
◽
Role Based
Download Full-text
A formal role-based access control model for security policies in multi-domain mobile networks
Computer Networks
◽
10.1016/j.comnet.2012.09.018
◽
2013
◽
Vol 57
(1)
◽
pp. 330-350
◽
Cited By ~ 14
Author(s):
D. Unal
◽
M.U. Caglayan
Keyword(s):
Access Control
◽
Mobile Networks
◽
Control Model
◽
Security Policies
◽
Role Based Access Control
◽
Access Control Model
◽
Role Based
Download Full-text
A UML profile for role-based access control
Proceedings of the 2nd international conference on Security of information and networks - SIN '09
◽
10.1145/1626195.1626217
◽
2009
◽
Cited By ~ 5
Author(s):
Çağdaş Cirit
◽
Feza Buzluca
Keyword(s):
Access Control
◽
Role Based Access Control
◽
Uml Profile
◽
Role Based
Download Full-text
Context-aware Role-based Access Control Using Security Levels
Proceedings of the 2015 Conference on research in adaptive and convergent systems - RACS
◽
10.1145/2811411.2811498
◽
2015
◽
Author(s):
Michal Trnka
◽
Tomas Cerny
Keyword(s):
Access Control
◽
Role Based Access Control
◽
Context Aware
◽
Security Levels
◽
Role Based
Download Full-text
Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets
IEEE Transactions on Computers
◽
10.1109/tc.2014.2375189
◽
2015
◽
Vol 64
(9)
◽
pp. 2490-2505
◽
Cited By ~ 10
Author(s):
Dianxiang Xu
◽
Michael Kent
◽
Lijo Thomas
◽
Tejeddine Mouelhi
◽
Yves Le Traon
Keyword(s):
Access Control
◽
Role Based Access Control
◽
Model Based
◽
Model Based Testing
◽
Role Based
Download Full-text
Inter-domain role based access control using ontology
2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)
◽
10.1109/icacci.2015.7275915
◽
2015
◽
Cited By ~ 5
Author(s):
S. Chandra Mouliswaran
◽
Ch. Aswani Kumar
◽
C. Chandrasekar
Keyword(s):
Access Control
◽
Role Based Access Control
◽
Role Based
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close