1999 |
8 | EE | John F. Barkley,
Konstantin Beznosov,
Jinny Uppal:
Supporting Relationships in Access Control Using Role Based Access Control.
ACM Workshop on Role-Based Access Control 1999: 55-65 |
7 | EE | Konstantin Beznosov,
Yi Deng,
Bob Blakley,
C. Burt,
John F. Barkley:
A Resource Access Decision Service for CORBA-Based Distributed Systems.
ACSAC 1999: 310-319 |
6 | EE | David F. Ferraiolo,
John F. Barkley,
D. Richard Kuhn:
A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet.
ACM Trans. Inf. Syst. Secur. 2(1): 34-64 (1999) |
1998 |
5 | EE | John F. Barkley,
Anthony Cincotta:
Managing Role/Permission Relationships Using Object Access Types.
ACM Workshop on Role-Based Access Control 1998: 73-80 |
4 | EE | Serban I. Gavrila,
John F. Barkley:
Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management.
ACM Workshop on Role-Based Access Control 1998: 81-90 |
1997 |
3 | EE | John F. Barkley:
Comparing simple role based access control models and access control lists.
ACM Workshop on Role-Based Access Control 1997: 127-132 |
2 | EE | David F. Ferraiolo,
John F. Barkley:
Specifying and managing role-based access control within a corporate intranet.
ACM Workshop on Role-Based Access Control 1997: 77-82 |
1995 |
1 | EE | John F. Barkley:
Implementing role-based access control using object technology.
ACM Workshop on Role-Based Access Control 1995 |