Amanote Research

Amanote Research

    RegisterSign In

A Secure, Constraint-Aware Role-Based Access Control Interoperation Framework

doi 10.1109/icnss.2011.6060001
Full Text
Open PDF
Abstract

Available in full text

Date

September 1, 2011

Authors
Nathalie BaracaldoAmirreza MasoumzadehJames Joshi
Publisher

IEEE


Related search

Role Hierarchies for Temporal Constraint Role-Based Access Control Model.

Journal of Computer Science and Cybernetics
2012English

A Novel Secure Interoperation System

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2007English

Threshold-Based Location-Aware Access Control

2013English

Specifying Role-Based Access Constraints With Object Constraint Language

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2004English

A Modal Logic for Role-Based Access Control

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2005English

A Datalog Framework for Modeling Relationship-Based Access Control Policies

2017English

Role-Based Access Control Consistency Validation

2006English

Reasoning About Secure Interoperation Using Soft Constraints

English

Context and Trust Aware Workflow Oriented Access Framework

2016English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy