Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
RBAC
1998
85views more  RBAC 1998»
12 years 1 months ago
Control Principles and Role Hierarchies
Role-based access control (RBAC) has been introduced in the last few years, and offers a powerful means of specifying access control decisions. The model of RBAC usually assumes t...
Jonathan D. Moffett
COMPSAC
2001
IEEE
12 years 3 months ago
Designing Role Hierarchies for Access Control in Workflow Systems
he correspondence between the role abstraction in Role-based Access Control (RBAC) and the notion of organizational positions, it seems easy to construct role hierarchies. This is...
Reinhardt A. Botha, Jan H. P. Eloff
POLICY
2004
Springer
12 years 5 months ago
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
We study the speciļ¬cation of access control policy in large-scale distributed systems. Our work on real-world policies has shown that standard policy idioms such as role hierarc...
Moritz Y. Becker, Peter Sewell
ACSAC
2008
IEEE
12 years 6 months ago
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies
Role hierarchies are fundamental to the role based access control (RBAC) model. The notion of role hierarchy is a well understood concept that allows senior roles to inherit the p...
Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri
books