Results 1 - 10
of
66,606
Role-Based Access Control
- In 15th NIST-NCSC National Computer Security Conference
, 1992
"... While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of a ..."
Abstract
-
Cited by 477 (6 self)
- Add to MetaCart
of access control is unfounded and inappropriate for many commercial and civilian government organizations. The paper describes a type of non-discretionary access control - role-based access control (RBAC) - that is more central to the secure processing needs of non-military systems then DAC. 1 Introduction
Role-Based Access Control
, 1997
"... The basic concept of role-based access control (RBAC) is that permissions are associated with roles, and users are made members of appropriate roles thereby acquiring the roles' permissions. This idea has been around since the advent of multi-user computing. Until recently, however, RBAC has re ..."
Abstract
-
Cited by 144 (10 self)
- Add to MetaCart
The basic concept of role-based access control (RBAC) is that permissions are associated with roles, and users are made members of appropriate roles thereby acquiring the roles' permissions. This idea has been around since the advent of multi-user computing. Until recently, however, RBAC has
XACML and role-based access control
- Presentation at DIMACS Workshop on Security of Web Services and e-Commerce
, 2005
"... Abstract. User delegation is a mechanism for assigning access rights available to a user to another user. A delegation operation can either be a grant or transfer operation. Delegation for role-based access control models have extensively studied grant delegations. However, transfer delegations for ..."
Abstract
-
Cited by 48 (6 self)
- Add to MetaCart
Abstract. User delegation is a mechanism for assigning access rights available to a user to another user. A delegation operation can either be a grant or transfer operation. Delegation for role-based access control models have extensively studied grant delegations. However, transfer delegations
Fuzzy Role-Based Access Control
"... RBAC (Role-Based Access Control) is a widely used access control model, which reduces the maintenance cost of classical identity-based access control. However, despite the benefits of RBAC, there are environments in which RBAC can hardly be applied. We present FRBAC (Fuzzy Role-Based Access Control) ..."
Abstract
- Add to MetaCart
RBAC (Role-Based Access Control) is a widely used access control model, which reduces the maintenance cost of classical identity-based access control. However, despite the benefits of RBAC, there are environments in which RBAC can hardly be applied. We present FRBAC (Fuzzy Role-Based Access Control
Role-based access control in DCOM
- Journal of Systems Architecture
"... The explosive growth of the Web, the increasing popularity of PCs and the advances in high-speed network access have brought distributed computing into the mainstream. To simplify network programming and to realize component-based software architecture, distributed object models have emerged as stan ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
. Also, we describe the concept of role-based access control (RBAC) which began with multi-user and multi-application on-line systems pioneered in the 1970s. And we investigate how we can enforce the role-based access control as a security provider within DCOM, specially in access security policy. Ó 2000
Proposed NIST Standard for Role-Based Access Control
, 2001
"... In this article we propose a standard for role-based access control (RBAC). Although RBAC models have received broad support as a generalized approach to access control, and are well recognized for their many advantages in performing large-scale authorization management, no single authoritative def ..."
Abstract
-
Cited by 544 (13 self)
- Add to MetaCart
In this article we propose a standard for role-based access control (RBAC). Although RBAC models have received broad support as a generalized approach to access control, and are well recognized for their many advantages in performing large-scale authorization management, no single authoritative
Role-Bases Access Control
, 2009
"... Eine Berechtigung besteht dabei aus beliebig vielen Operationen auf einer Ressource ..."
Abstract
- Add to MetaCart
Eine Berechtigung besteht dabei aus beliebig vielen Operationen auf einer Ressource
Obligations for Role Based Access Control
- In Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW
, 2007
"... Role based access control has been widely used in security critical systems. Conventional role based access control is a passive model, which makes authorization decisions on requests, and the authorization decisions contain only information about whether the corresponding requests are authorised or ..."
Abstract
-
Cited by 9 (1 self)
- Add to MetaCart
Role based access control has been widely used in security critical systems. Conventional role based access control is a passive model, which makes authorization decisions on requests, and the authorization decisions contain only information about whether the corresponding requests are authorised
Role-based Access Control for Boxed
"... Ronchi Della Rocca on the occasion of their sixtieth birthdays Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the academic community to study the security problems arising from ..."
Abstract
- Add to MetaCart
access, their credentials, and the location from which they seek it, within a reconfigurable nested structure. We define BACIR, a boxed ambient calculus extended with a Distributed Role-Based Access Control mechanism where each ambient controls its own access policy. A process in BACIR is associated
Cryptographic Enforcement of Role-Based Access Control
"... Abstract. Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, using role-based access control policies rather than information flow policies. In this paper, we provide an alter ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
Abstract. Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, using role-based access control policies rather than information flow policies. In this paper, we provide
Results 1 - 10
of
66,606