• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 66,606
Next 10 →

Role-Based Access Control

by David Ferraiolo, Richard Kuhn - In 15th NIST-NCSC National Computer Security Conference , 1992
"... While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of a ..."
Abstract - Cited by 477 (6 self) - Add to MetaCart
of access control is unfounded and inappropriate for many commercial and civilian government organizations. The paper describes a type of non-discretionary access control - role-based access control (RBAC) - that is more central to the secure processing needs of non-military systems then DAC. 1 Introduction

Role-Based Access Control

by Ravi S. Sandhu , 1997
"... The basic concept of role-based access control (RBAC) is that permissions are associated with roles, and users are made members of appropriate roles thereby acquiring the roles' permissions. This idea has been around since the advent of multi-user computing. Until recently, however, RBAC has re ..."
Abstract - Cited by 144 (10 self) - Add to MetaCart
The basic concept of role-based access control (RBAC) is that permissions are associated with roles, and users are made members of appropriate roles thereby acquiring the roles' permissions. This idea has been around since the advent of multi-user computing. Until recently, however, RBAC has

XACML and role-based access control

by Jason Crampton, Hemanth Khambhammettu - Presentation at DIMACS Workshop on Security of Web Services and e-Commerce , 2005
"... Abstract. User delegation is a mechanism for assigning access rights available to a user to another user. A delegation operation can either be a grant or transfer operation. Delegation for role-based access control models have extensively studied grant delegations. However, transfer delegations for ..."
Abstract - Cited by 48 (6 self) - Add to MetaCart
Abstract. User delegation is a mechanism for assigning access rights available to a user to another user. A delegation operation can either be a grant or transfer operation. Delegation for role-based access control models have extensively studied grant delegations. However, transfer delegations

Fuzzy Role-Based Access Control

by Guillermo Navarro-arribasb, Joan Borrella
"... RBAC (Role-Based Access Control) is a widely used access control model, which reduces the maintenance cost of classical identity-based access control. However, despite the benefits of RBAC, there are environments in which RBAC can hardly be applied. We present FRBAC (Fuzzy Role-Based Access Control) ..."
Abstract - Add to MetaCart
RBAC (Role-Based Access Control) is a widely used access control model, which reduces the maintenance cost of classical identity-based access control. However, despite the benefits of RBAC, there are environments in which RBAC can hardly be applied. We present FRBAC (Fuzzy Role-Based Access Control

Role-based access control in DCOM

by Gail-joon Ahn - Journal of Systems Architecture
"... The explosive growth of the Web, the increasing popularity of PCs and the advances in high-speed network access have brought distributed computing into the mainstream. To simplify network programming and to realize component-based software architecture, distributed object models have emerged as stan ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
. Also, we describe the concept of role-based access control (RBAC) which began with multi-user and multi-application on-line systems pioneered in the 1970s. And we investigate how we can enforce the role-based access control as a security provider within DCOM, specially in access security policy. Ó 2000

Proposed NIST Standard for Role-Based Access Control

by David F. Ferraiolo, Ravi Sandhu, Serban Gavrila, D. Richard Kuhn, Ramaswamy Chandramouli , 2001
"... In this article we propose a standard for role-based access control (RBAC). Although RBAC models have received broad support as a generalized approach to access control, and are well recognized for their many advantages in performing large-scale authorization management, no single authoritative def ..."
Abstract - Cited by 544 (13 self) - Add to MetaCart
In this article we propose a standard for role-based access control (RBAC). Although RBAC models have received broad support as a generalized approach to access control, and are well recognized for their many advantages in performing large-scale authorization management, no single authoritative

Role-Bases Access Control

by Dennis Schulz, Einfuehrung I, Uebersichtliche Darstellung Der Zugriffsrechte, Einfuehrung Ii, Automatische Transformierung Zu Quelltext, Weniger Fehler Hierbei, Secureuml I, Uebersichtliche Darstellung Der Architektur, Secureuml I, Bewaehrtes Konzept Der Zugriffssteuerung, Secureuml Ii, Secureuml I, Secureuml Ii, Permissionrole Protectedobject , 2009
"... Eine Berechtigung besteht dabei aus beliebig vielen Operationen auf einer Ressource ..."
Abstract - Add to MetaCart
Eine Berechtigung besteht dabei aus beliebig vielen Operationen auf einer Ressource

Obligations for Role Based Access Control

by Gansen Zhao, David Chadwick, Sassa Otenko - In Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW , 2007
"... Role based access control has been widely used in security critical systems. Conventional role based access control is a passive model, which makes authorization decisions on requests, and the authorization decisions contain only information about whether the corresponding requests are authorised or ..."
Abstract - Cited by 9 (1 self) - Add to MetaCart
Role based access control has been widely used in security critical systems. Conventional role based access control is a passive model, which makes authorization decisions on requests, and the authorization decisions contain only information about whether the corresponding requests are authorised

Role-based Access Control for Boxed

by Adriana Compagnoni, Elsa L. Gunter, Mariangiola Dezani-ciancaglini
"... Ronchi Della Rocca on the occasion of their sixtieth birthdays Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the academic community to study the security problems arising from ..."
Abstract - Add to MetaCart
access, their credentials, and the location from which they seek it, within a reconfigurable nested structure. We define BACIR, a boxed ambient calculus extended with a Distributed Role-Based Access Control mechanism where each ambient controls its own access policy. A process in BACIR is associated

Cryptographic Enforcement of Role-Based Access Control

by Jason Crampton
"... Abstract. Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, using role-based access control policies rather than information flow policies. In this paper, we provide an alter ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
Abstract. Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, using role-based access control policies rather than information flow policies. In this paper, we provide
Next 10 →
Results 1 - 10 of 66,606
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University