Skip to main content

previous disabled Page of 2
and
  1. No Access

    Reference Work Entry In depth

    Temporal Access Control

    Yue Zhang, James B. D. Joshi in Encyclopedia of Database Systems (2018)

  2. No Access

    Reference Work Entry In depth

    ANSI/INCITS RBAC Standard

    Yue Zhang, James B. D. Joshi in Encyclopedia of Database Systems (2018)

  3. No Access

    Reference Work Entry In depth

    Administration Model for RBAC

    Yue Zhang, James B. D. Joshi in Encyclopedia of Database Systems (2018)

  4. No Access

    Reference Work Entry In depth

    Role-Based Access Control

    Yue Zhang, James B. D. Joshi in Encyclopedia of Database Systems (2018)

  5. No Access

    Reference Work Entry In depth

    GEO-RBAC Model

    Yue Zhang, James B. D. Joshi in Encyclopedia of Database Systems (2018)

  6. No Access

    Living Reference Work Entry In depth

    Temporal Access Control

    Yue Zhang, James B. D. Joshi in Encyclopedia of Database Systems

  7. No Access

    Living Reference Work Entry In depth

    GEO-RBAC Model

    Yue Zhang, James B. D. Joshi in Encyclopedia of Database Systems

  8. No Access

    Living Reference Work Entry In depth

    ANSI/INCITS RBAC Standard

    Yue Zhang, James B. D. Joshi in Encyclopedia of Database Systems

  9. No Access

    Living Reference Work Entry In depth

    Administration Model for RBAC

    Yue Zhang, James B. D. Joshi in Encyclopedia of Database Systems

  10. No Access

    Living Reference Work Entry In depth

    Role Based Access Control

    Yue Zhang, James B. D. Joshi in Encyclopedia of Database Systems

  11. No Access

    Article

    A survey of security issue in multi-agent systems

    Multi-agent systems have attracted the attention of researchers because of agents’ automatic, pro-active, and dynamic problem solving behaviors. Consequently, there has been a rapid development in agent techno...

    Youna Jung, Minsoo Kim, Amirreza Masoumzadeh in Artificial Intelligence Review (2012)

  12. No Access

    Book and Conference Proceedings

  13. No Access

    Reference Work Entry In depth

    Role Based Access Control

    Yue Zhang, James B.D. Joshi in Encyclopedia of Database Systems (2009)

  14. No Access

    Reference Work Entry In depth

    ANSI/INCITS RBAC Standard

    Yue Zhang, James B. D. Joshi in Encyclopedia of Database Systems (2009)

  15. No Access

    Reference Work Entry In depth

    Temporal Access Control

    Yue Zhang, James B. D. Joshi in Encyclopedia of Database Systems (2009)

  16. No Access

    Reference Work Entry In depth

    Administration Model for RBAC

    Yue Zhang, James B. D. Joshi in Encyclopedia of Database Systems (2009)

  17. No Access

    Reference Work Entry In depth

    GEO-RBAC Model

    Yue Zhang, James B. D. Joshi in Encyclopedia of Database Systems (2009)

  18. No Access

    Chapter and Conference Paper

    Access Control for Cooperation Systems Based on Group Situation

    Cooperation systems characterize many emerging environments such as ubiquitous and pervasive systems. Agent based cooperation systems have been proposed in the literature to address challenges of such emerging...

    Minsoo Kim, James B. D. Joshi, Minkoo Kim in Collaborative Computing: Networking, Appli… (2009)

  19. No Access

    Chapter and Conference Paper

    RiBAC: Role Interaction Based Access Control Model for Community Computing

    Community computing is an agent-based development paradigm for ubiquitous computing systems. In a community computing system, ubiquitous services are provided by cooperation among agents. While agents cooperat...

    Youna Jung, Amirreza Masoumzadeh in Collaborative Computing: Networking, Appli… (2009)

  20. No Access

    Chapter and Conference Paper

    PuRBAC: Purpose-Aware Role-Based Access Control

    Several researches in recent years have pointed out that for the proper enforcement of privacy policies within enterprise data handling practices the privacy requirements should be captured in access control s...

    Amirreza Masoumzadeh, James B. D. Joshi in On the Move to Meaningful Internet Systems… (2008)

previous disabled Page of 2