Author of the publication

Access Rights Administration in Role-Based Security Systems

, and . Proceedings of the IFIP WG11.3 Working Conference on Database Security VII, page 37--56. Amsterdam, The Netherlands, The Netherlands, North-Holland Publishing Co., (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privilege Administration for the Role Graph Model., and . DBSec, volume 256 of IFIP Conference Proceedings, page 15-25. Kluwer, (2002)Object Modelling.. OODBS, page 231. IEEE Computer Society, (1986)Access Rights Administration in Role-Based Security Systems, and . Proceedings of the IFIP WG11.3 Working Conference on Database Security VII, page 37--56. Amsterdam, The Netherlands, The Netherlands, North-Holland Publishing Co., (1994)Role-based access control: past, present and future.. PST, volume 380 of ACM International Conference Proceeding Series, page 4. ACM, (2006)A role-based approach to access control for XML databases., and . SACMAT, page 70-77. ACM, (2004)Panel., , , , , , and . DBSec, volume 201 of IFIP Conference Proceedings, page 367-371. Kluwer, (2000)Teaching relational database concepts in a university environment.. SIGCSE, page 1-3. ACM, (1982)Strategies for Incorporating Delegation into Attribute-Based Access Control (ABAC)., and . FPS, volume 10128 of Lecture Notes in Computer Science, page 320-328. Springer, (2016)Modeling Mandatory Access Control in Role-Based Security Systems., and . DBSec, volume 51 of IFIP Conference Proceedings, page 129-144. Chapman & Hall, (1995)Modeling users in role-based access control., and . ACM Workshop on Role-Based Access Control, page 31-37. ACM, (2000)