Fifth ACM Workshop on Role-Based Access Control
Entry type
proceedings
Institution
Association for Computing Machinery (ACM)
Key alpha
acm
Publisher
ACM Press
Publication Date
1900-01-01
Contents
Session 1: Implementations
Injecting RBAC to Secure a Web-based Workflow System
Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks
Session 2: Models
TRBAC: A Temporal Role-based Access Control Model
Modeling Users in Role-Based Access Control
Role Delegation in Role-Based Access Control
Session 3: Unified Model for RBAC
The NIST Model for Role-based Access Control: Towards a Unified Standard
Rebuttal to the NIST RBAC Model Proposal
Session 4: Panel on Role Engineering
Session 5: Requirements
A Model of Accountability, Confidentiality and Override for Healthcare and other Applications
Enabling Technologies for Role-based Online Decision Engines
Three for One: Role-based Access Control Management in Rapidly Changing Heterogeneous
Environments
Session 6: Panel on Integrating RBAC into Workflow and Collaborative Environments
Session 7: Role Engineering
Integrated Constraints and Inheritance in DTAC
Process-Oriented Approach for Role-Finding to Implement Role-Based Security Administration in a Large Industrial Organization
Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way
Session 8: Future Plans
Copyright
2000
Isbn
1-58113-259-X
Language
English
Location
A hard-copy of this is in the CERIAS Library

