… A review of the state of the art of role-based access control can help practitioners assess RBAC’s applicability to their organization and indicates where more research is needed to improve the RBAC model. …
computer, 45:81-88, 2012. [doi]… Role-based access control (RBAC) is a powerful means for laying out higher-level organizational policies such as separation of duty, and for simplifying the security management process. One of the important aspects of RBAC is authorization …
Computer Security Applications Conference, 2008. ACSAC 2008. Annual, , Nov 2008. [doi]… Role-based access control (RBAC) is a powerful means for laying out higher-level organizational policies such as separation of duty, and for simplifying the security management process. One of the important aspects of RBAC is authorization …
Computer Security Applications Conference, 2008. ACSAC 2008. Annual, , Nov 2008. [doi]… organizations. The paper describes a type of non-discretionary access control - role-based …While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived …
eprint arXiv, 0903, Mar 2009.… organizations. The paper describes a type of non-discretionary access control - role-based …While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived …
eprint arXiv, 0903, Mar 2009.… organizations. The paper describes a type of non-discretionary access control - role-based …While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived …
arXiv, cs.CR, Mar 2009.… organizations. The paper describes a type of non-discretionary access control - role-based …While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived …
arXiv, cs.CR, Mar 2009.… Role hierarchies are fundamental to the role based access control (RBAC) model. The notion of role hierarchy is a well understood concept that allows senior roles to inherit the permissions of the corresponding junior roles. Role …
Computer Security Applications Conference, 2008. ACSAC 2008. Annual, , Nov 2008. [doi]… Role hierarchies are fundamental to the role based access control (RBAC) model. The notion of role hierarchy is a well understood concept that allows senior roles to inherit the permissions of the corresponding junior roles. Role …
Computer Security Applications Conference, 2008. ACSAC 2008. Annual, , Nov 2008. [doi]… Emerging models for context-aware role-based access control pose challenging requirements over policy administration. In this paper we address the issues raised by the decentralized administration of a spatially-aware access control model …
Availability, Reliability and Security, 2008. ARES 08. Third International Conference on, , Feb 2008. [doi]… Emerging models for context-aware role-based access control pose challenging requirements over policy administration. In this paper we address the issues raised by the decentralized administration of a spatially-aware access control model …
Availability, Reliability and Security, 2008. ARES 08. Third International Conference on, , Feb 2008. [doi]… The ARBAC97 and Crampton-Loizou models make an important contribution to the understanding and modeling of administration of role-based access control. However, there are several features of both models which we believe could be improved …
Security Technology, 2008. SECTECH '08. International Conference on, , Nov 2008. [doi]… The ARBAC97 and Crampton-Loizou models make an important contribution to the understanding and modeling of administration of role-based access control. However, there are several features of both models which we believe could be improved …
Security Technology, 2008. SECTECH '08. International Conference on, , Nov 2008. [doi]… RBAC (role based access control) can support the implementation of both MAC and DAC features at the same time. This feature has been proved to be necessary in healthcare environments. The result of this mix can redefine a number …
Ubiquitous Multimedia Computing, 2008. UMC '08. International Symposium on, , Sep 2008. [doi]… RBAC (role based access control) can support the implementation of both MAC and DAC features at the same time. This feature has been proved to be necessary in healthcare environments. The result of this mix can redefine a number …
Ubiquitous Multimedia Computing, 2008. UMC '08. International Symposium on, , Sep 2008. [doi]… Aimed at security issues in collaborative process planning system, a multi-level and dynamic access control (PPMLDAC) model was proposed for collaborative process planning based on Role Based Access Control (RBAC) model. A multi-level …
Intelligent Information Technology Application, 2008. IITA '08. Second International Symposium on, 1, Nov 2008. [doi]… Aimed at security issues in collaborative process planning system, a multi-level and dynamic access control (PPMLDAC) model was proposed for collaborative process planning based on Role Based Access Control (RBAC) model. A multi-level …
Intelligent Information Technology Application, 2008. IITA '08. Second International Symposium on, 1, Nov 2008. [doi]… Role Based Access Control (RBAC) is arguably the most common access control mechanism today due to its applicability at various levels of authorization in a system. Time varying nature of access control in RBAC administered systems …
Information Assurance and Security, 2008. ISIAS '08. Fourth International Conference on, , Aug 2008. [doi]… Role Based Access Control (RBAC) is arguably the most common access control mechanism today due to its applicability at various levels of authorization in a system. Time varying nature of access control in RBAC administered systems …
Information Assurance and Security, 2008. ISIAS '08. Fourth International Conference on, , Aug 2008. [doi]