ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A constraint based role based access control in the SECTET a model-driven approach
Proceedings of the 2006 International Conference on Privacy, Security and Trust Bridge the Gap Between PST Technologies and Business Services - PST '06
◽
10.1145/1501434.1501451
◽
2006
◽
Cited By ~ 3
Author(s):
Muhammad Alam
◽
Michael Hafner
◽
Ruth Breu
Keyword(s):
Access Control
◽
Role Based Access Control
◽
Model Driven
◽
Role Based
◽
Model Driven Approach
Download Full-text
Related Documents
Cited By
References
A model-driven approach for the visual specification of Role-Based Access Control policies in web systems
2008 IEEE Symposium on Visual Languages and Human-Centric Computing
◽
10.1109/vlhcc.2008.4639087
◽
2008
◽
Cited By ~ 3
Author(s):
Paloma Diaz
◽
Ignacio Aedo
◽
Daniel Sanz
◽
Alessio Malizia
Keyword(s):
Access Control
◽
Role Based Access Control
◽
Control Policies
◽
Model Driven
◽
Access Control Policies
◽
Role Based
◽
Visual Specification
◽
Model Driven Approach
◽
Web Systems
Download Full-text
A Model-driven Role-based Access Control for SQL Databases
Complex Systems Informatics and Modeling Quarterly
◽
10.7250/csimq.2015-3.03
◽
2015
◽
pp. 35-62
◽
Cited By ~ 1
Author(s):
Raimundas Matulevičius
◽
Henri Lakk
Keyword(s):
Access Control
◽
Role Based Access Control
◽
Model Driven
◽
Role Based
Download Full-text
Role-Based Access Control for Model-Driven Web Applications
Lecture Notes in Computer Science - Web Engineering
◽
10.1007/978-3-642-31753-8_8
◽
2012
◽
pp. 106-120
◽
Cited By ~ 4
Author(s):
Mairon Belchior
◽
Daniel Schwabe
◽
Fernando Silva Parreiras
Keyword(s):
Access Control
◽
Web Applications
◽
Role Based Access Control
◽
Model Driven
◽
Role Based
Download Full-text
A Model-Driven Framework for Ensuring Role Based Access Control in IoT Devices
Proceedings of the 2020 6th International Conference on Computing and Artificial Intelligence
◽
10.1145/3404555.3404582
◽
2020
◽
Author(s):
Mariam Bisma
◽
Farooque Azam
◽
Yawar Rasheed
◽
Muhammad Waseem Anwar
Keyword(s):
Access Control
◽
Role Based Access Control
◽
Model Driven
◽
Role Based
◽
Iot Devices
Download Full-text
Model-driven run-time enforcement of complex role-based access control policies
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering - ASE 2018
◽
10.1145/3238147.3238167
◽
2018
◽
Cited By ~ 4
Author(s):
Ameni Ben Fadhel
◽
Domenico Bianculli
◽
Lionel C. Briand
Keyword(s):
Access Control
◽
Role Based Access Control
◽
Control Policies
◽
Model Driven
◽
Access Control Policies
◽
Run Time
◽
Role Based
Download Full-text
Modifiedhierarchical privacy-aware role based access control model
Proceedings of the 2012 ACM Research in Applied Computation Symposium on - RACS '12
◽
10.1145/2401603.2401679
◽
2012
◽
Cited By ~ 2
Author(s):
Sanjeev Arora
◽
Eunjee Song
◽
Yoonjeong Kim
Keyword(s):
Access Control
◽
Control Model
◽
Role Based Access Control
◽
Access Control Model
◽
Role Based
Download Full-text
Solving some optimization tasks of assigning roles within the framework of well-known estimates of relative damage from leakage of authority in a role-based access control model
2019 Dynamics of Systems, Mechanisms and Machines (Dynamics)
◽
10.1109/dynamics47113.2019.8944724
◽
2019
◽
Author(s):
Sergey V. Usov
◽
Anton N. Mironenko
Keyword(s):
Access Control
◽
Control Model
◽
Role Based Access Control
◽
Access Control Model
◽
Relative Damage
◽
Role Based
Download Full-text
A web application system development platform based on role-based access control model
2010 International Conference on Computer Application and System Modeling (ICCASM 2010)
◽
10.1109/iccasm.2010.5622116
◽
2010
◽
Author(s):
Ma Xiao-jun
◽
Yan Xi
Keyword(s):
Access Control
◽
Web Application
◽
System Development
◽
Control Model
◽
Role Based Access Control
◽
Access Control Model
◽
Application System
◽
Development Platform
◽
Web Application System
◽
Role Based
Download Full-text
A formal role-based access control model for security policies in multi-domain mobile networks
Computer Networks
◽
10.1016/j.comnet.2012.09.018
◽
2013
◽
Vol 57
(1)
◽
pp. 330-350
◽
Cited By ~ 14
Author(s):
D. Unal
◽
M.U. Caglayan
Keyword(s):
Access Control
◽
Mobile Networks
◽
Control Model
◽
Security Policies
◽
Role Based Access Control
◽
Access Control Model
◽
Role Based
Download Full-text
A UML profile for role-based access control
Proceedings of the 2nd international conference on Security of information and networks - SIN '09
◽
10.1145/1626195.1626217
◽
2009
◽
Cited By ~ 5
Author(s):
Çağdaş Cirit
◽
Feza Buzluca
Keyword(s):
Access Control
◽
Role Based Access Control
◽
Uml Profile
◽
Role Based
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close