Sciweavers

7 search results - page 1 / 2
» Extended privilege inheritance in RBAC
Sort
View
CCS
2007
ACM
13 years 11 months ago
Extended privilege inheritance in RBAC
In existing RBAC literature, administrative privileges are inherited just like ordinary user privileges. We argue that from a security viewpoint this is too restrictive, and we be...
M. A. C. Dekker, J. G. Cederquist, Jason Crampton,...
ISI
2004
Springer
13 years 10 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
CCS
2008
ACM
13 years 6 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
MMMACNS
2005
Springer
13 years 10 months ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
GIS
2008
ACM
14 years 5 months ago
A location aware role and attribute based access control system
In this paper, we follow the role-based access control (RBAC) approach and extend it to provide for the dynamic association of roles with users. In our framework, privileges assoc...
Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko...