Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/784589.784658guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Role-Based Access Control Framework for Network Enterprises

Published: 07 December 1998 Publication History

Abstract

No abstract available.

Cited By

View all
  • (2011)Incorporating social-cultural contexts in role engineering: an activity theoretic approachInternational Journal of Business Information Systems10.1504/IJBIS.2011.0372977:1(60-77)Online publication date: 1-Dec-2011
  • (2011)Practical policy patternsProceedings of the first ACM conference on Data and application security and privacy10.1145/1943513.1943543(225-230)Online publication date: 21-Feb-2011
  • (2010)Automating security configuration and administrationProceedings of the 5th international conference on Advances in information and computer security10.5555/1927197.1927199(1-9)Online publication date: 22-Nov-2010
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
ACSAC '98: Proceedings of the 14th Annual Computer Security Applications Conference
December 1998
ISBN:0818687894

Publisher

IEEE Computer Society

United States

Publication History

Published: 07 December 1998

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2011)Incorporating social-cultural contexts in role engineering: an activity theoretic approachInternational Journal of Business Information Systems10.1504/IJBIS.2011.0372977:1(60-77)Online publication date: 1-Dec-2011
  • (2011)Practical policy patternsProceedings of the first ACM conference on Data and application security and privacy10.1145/1943513.1943543(225-230)Online publication date: 21-Feb-2011
  • (2010)Automating security configuration and administrationProceedings of the 5th international conference on Advances in information and computer security10.5555/1927197.1927199(1-9)Online publication date: 22-Nov-2010
  • (2010)The role mining problemACM Transactions on Information and System Security10.1145/1805974.180598313:3(1-31)Online publication date: 30-Jul-2010
  • (2009)Edge-RMP: Minimizing administrative assignments for role-based access controlJournal of Computer Security10.5555/1544133.154413717:2(211-235)Online publication date: 1-Apr-2009
  • (2008)Panel on role engineeringProceedings of the 13th ACM symposium on Access control models and technologies10.1145/1377836.1377846(61-62)Online publication date: 11-Jun-2008
  • (2008)Migrating to optimal RBAC with minimal perturbationProceedings of the 13th ACM symposium on Access control models and technologies10.1145/1377836.1377839(11-20)Online publication date: 11-Jun-2008
  • (2008)Role engineeringJournal of Systems and Software10.1016/j.jss.2007.11.00381:8(1306-1326)Online publication date: 1-Aug-2008
  • (2007)Requirements for scalable access control and security management architecturesACM Transactions on Internet Technology10.1145/1239971.12399727:2(8-es)Online publication date: 1-May-2007
  • (2006)RoleMinerProceedings of the 13th ACM conference on Computer and communications security10.1145/1180405.1180424(144-153)Online publication date: 30-Oct-2006
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media