Contents
Session 1: Implementations
Injecting RBAC to Secure a Web-based Workflow System
Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks
Session 2: Models
TRBAC: A Temporal Role-based Access Control Model
Modeling Users in Role-Based Access Control
Role Delegation in Role-Based Access Control
Session 3: Unified Model for RBAC
The NIST Model for Role-based Access Control: Towards a Unified Standard
Rebuttal to the NIST RBAC Model Proposal
Session 4: Panel on Role Engineering
Session 5: Requirements
A Model of Accountability, Confidentiality and Override for Healthcare and other Applications
Enabling Technologies for Role-based Online Decision Engines
Three for One: Role-based Access Control Management in Rapidly Changing Heterogeneous
Environments
Session 6: Panel on Integrating RBAC into Workflow and Collaborative Environments
Session 7: Role Engineering
Integrated Constraints and Inheritance in DTAC
Process-Oriented Approach for Role-Finding to Implement Role-Based Security Administration in a Large Industrial Organization
Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way
Session 8: Future Plans