117 papers found
Refreshing results…
Practical and Efficient Cryptographic Enforcement of Interval-Based Access Control Policies
Download from citeseerx.ist.psu.eduTowards an Access-Control Framework for Countering Insider Threats
Download from www.researchgate.netCryptographic Enforcement of Role-Based Access Control.
Download from citeseerx.ist.psu.eduConstructing Key Assignment Schemes from Chain Partitions
Download from link.springer.comAn Authorization Framework Resilient to Policy Evaluation Failures
Download from www.researchgate.netTrade-Offs in Cryptographic Implementations of Temporal Access Control
Download from citeseerx.ist.psu.eduSet Covering Problems in Role-Based Access Control
Download from citeseerx.ist.psu.eduAuthorization recycling in RBAC systems
Download from citeseerx.ist.psu.eduRBAC administration in distributed systems
Download from library.tue.nlOn spatio-temporal constraints and inheritance in role-based access control.
Download from citeseerx.ist.psu.eduApplications of the Oriented Permission Role-Based Access Control Model
Download from citeseerx.ist.psu.eduMissing publications? Read more about our data sources.