• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,509
Next 10 →

Control priciples and Role Hierarchies

by Jonathan D. Moffett , 1998
"... Role-based access control (RBAC) has been introduced in the last few years, and offers a powerful means of specifying access control decisions. The model of RBAC usually assumes that, if there is a role hierarchy, then access rights are inherited upwards through the hierarchy. This paper examines th ..."
Abstract - Add to MetaCart
Role-based access control (RBAC) has been introduced in the last few years, and offers a powerful means of specifying access control decisions. The model of RBAC usually assumes that, if there is a role hierarchy, then access rights are inherited upwards through the hierarchy. This paper examines

Inheritance properties of role hierarchies

by W. A. Jansen - In 21st National Information Systems Security Conference , 1998
"... Abstract: Role Based Access Control (RBAC) refers to a class of security mechanisms that mediate access to resources through organizational identities called roles. A number of models have been published [1, 2,3] that formally describe the basic properties of RBAC. One feature of these models is the ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
is the notion of a role hierarchy, which represents the relationship among roles that are defined in terms of other roles and inherit basic capabilities from them. This paper explores some interesting characteristics of role hierarchies and how they affect basic RBAC properties such as separation of duty.

Inheritance Properties Of Role Hierarchies

by Rc Hi Es
"... : Role Based Access Control (RBAC) refers to a class of security mechanisms that mediate access to resources through organizational identities called roles. A number of models have been published [1,2,3] that formally describe the basic properties of RBAC. One feature of these models is the notion o ..."
Abstract - Add to MetaCart
of a role hierarchy, which represents the relationship among roles that are defined in terms of other roles and inherit basic capabilities from them. This paper explores some interesting characteristics of role hierarchies and how they affect basic RBAC properties such as separation of duty. Keywords

Role hierarchies and number restrictions

by Hans Jurgen Ohlbach, Jana Koehler - In Proceedings of the 1997 International Workshop on Description Logics (DL’97 , 1997
"... We present the atomic decomposition tech-nique as a general method for reducing reason-ing about cardinalities of sets, in the DL case the cardinalities of role llers, to equation solv-ing problems. Then we apply the technique to a particular description logic with complex role terms and role hierar ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
We present the atomic decomposition tech-nique as a general method for reducing reason-ing about cardinalities of sets, in the DL case the cardinalities of role llers, to equation solv-ing problems. Then we apply the technique to a particular description logic with complex role terms and role

The Uses of Role Hierarchies in Access Control

by Jonathan Moffett , 1999
"... The value of role-based access control (RBAC) is now well recognised. One aspect of it is the ability to make access decisions based upon the position of a role in a hierarchy. It is now recognised that there are some problems associated with this, because of the risk that these decisions may confli ..."
Abstract - Cited by 21 (0 self) - Add to MetaCart
The value of role-based access control (RBAC) is now well recognised. One aspect of it is the ability to make access decisions based upon the position of a role in a hierarchy. It is now recognised that there are some problems associated with this, because of the risk that these decisions may

Administrative scope and role hierarchy operations

by Jason Crampton, George Loizou - In Proceedings of Seventh ACM Symposium on Access Control Models and Technologies (SACMAT 2002 , 2002
"... The ARBAC97 model makes an important contribution to the understanding and modeling of administration in role-based access control. However, there are several features of the model which we believe could be improved. We introduce the concept of administrative scope in a role hierarchy and show how t ..."
Abstract - Cited by 14 (0 self) - Add to MetaCart
The ARBAC97 model makes an important contribution to the understanding and modeling of administration in role-based access control. However, there are several features of the model which we believe could be improved. We introduce the concept of administrative scope in a role hierarchy and show how

The Uses of Role Hierarchies in Access Control

by Jonathan Moffett Department, Jonathan D. Moffett, Emil C. Lupu - George Mason University , 1999
"... The value of role-based access control (RBAC) is now well recognised. One aspect of it is the ability to make access decisions based upon the position of a role in a hierarchy. It is now recognised that there are some problems associated with this, because of the risk that these decisions may confli ..."
Abstract - Add to MetaCart
The value of role-based access control (RBAC) is now well recognised. One aspect of it is the ability to make access decisions based upon the position of a role in a hierarchy. It is now recognised that there are some problems associated with this, because of the risk that these decisions may

Role Hierarchies and Constraints for Lattice-Based Access Controls

by Ravi Sandhu - Proc. Fourth European Symposium on Research in Computer Security , 1996
"... Role-based access control (RBAC) is a promising alternative to traditional discretionary and mandatory access controls. In RBAC permissions are associated with roles, and users are made members of appropriate roles thereby acquiring the roles' permissions. In this paper we formally show that la ..."
Abstract - Cited by 81 (5 self) - Add to MetaCart
that lattice-based mandatory access controls can be enforced by appropriate configuration of RBAC components. Our constructions demonstrate that role hierarchies and constraints are required to effectively achieve this result. We show that variations of the lattice-based *-property, such as write-up (liberal

A description logic with transitive and inverse roles and role hierarchies

by Ian Horrocks, Ulrike Sattler , 1998
"... transitive roles play an important rôle in the adequate representation of aggregated objects: they allow these objects to be described by referring to their parts without specifying a level of decomposition. In [Horrocks & Gough, 1997], the Description Logic (DL) ALCH R + is presented, which ext ..."
Abstract - Cited by 135 (25 self) - Add to MetaCart
extends ALC with transitive roles and a role hierarchy. It is argued in [Sattler, 1998] that ALCH R + is well-suited to the representation of aggregated objects in applications that require various part-whole relations to be distinguished, some of which are transitive. For example, a medical knowledge

Restrictions, Role Hierarchies, and Transitively Closed Roles

by Volker Haarslev, Ralf Möller, Arbeitsbereich Kogs, Volker Haarslev, Ralf Möller
"... We present a new tableaux calculus deciding the ABox consistency problem for the expressive description logic ALCN HR +. Prominent language features of ALCN HR + are number restrictions, role hierarchies, transitively closed roles, and generalized concept inclusions. The ABox description logic syste ..."
Abstract - Add to MetaCart
We present a new tableaux calculus deciding the ABox consistency problem for the expressive description logic ALCN HR +. Prominent language features of ALCN HR + are number restrictions, role hierarchies, transitively closed roles, and generalized concept inclusions. The ABox description logic
Next 10 →
Results 1 - 10 of 2,509
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University