• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: RBAC ]" (4)
  1. 1. An Object-Oriented Analysis and Design Methodology for Security of Web Applications
    Kyung-Soo Joo, Jung-Woong Woo, Vol. 14, No. 4, pp. 35-42, Aug. 2013
    10.7472/jksii.2013.14.4.35
    Keywords: Object-Oriented Analysis and Design, Web Application, Security, RBAC, Java EE
  2. 2. Role Graph Security Management Model based on Lattice
    Eun-Bok Choi, Ju-Gi Park, Jae-Hoon Kim, Vol. 7, No. 5, pp. 109-122, Oct. 2006
    Keywords: MAC, Lattice, RBAC, Role Graph, access control
  3. 3. Extended GTRBAC Delegation Model for Access Control Enforcement in Enterprise Environments
    Hwang Yu-Dong, Park Dong-Gue, Vol. 7, No. 1, pp. 17-30, Feb. 2006
    Keywords: access control, RBAC, temporal constraint, sub-role, GTRBAC
  4. 4. A Role-Based Access Control Model of Managed Objects in Distributed System Environments
    Choi Eun-Bok, Vol. 4, No. 1, pp. 75-0, Feb. 2003
    Keywords: RBAC, Managed Objects, Network Management