Sciweavers

195 search results - page 3 / 39
» How Role Based Access Control is Implemented in SESAME
Sort
View
COMPSAC
2002
IEEE
13 years 11 months ago
Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model
Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBAC’...
James Joshi, Elisa Bertino, Arif Ghafoor
ACSAC
2009
IEEE
14 years 1 months ago
How to Securely Break into RBAC: The BTG-RBAC Model
—Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on ...
Ana Ferreira, David W. Chadwick, Pedro Farinha, Ri...
IFIP
2010
Springer
13 years 1 months ago
Cryptographic Enforcement of Role-Based Access Control
Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, usin...
Jason Crampton
ICDIM
2010
IEEE
13 years 4 months ago
Risk management in dynamic role based access control systems
We present a risk management framework which allows to reason about and manage risk for role based access control systems. The framework expresses essential characteristics of risk...
Ji Ma, Kamel Adi, Luigi Logrippo, Serge Mankovski
TACAS
2009
Springer
207views Algorithms» more  TACAS 2009»
14 years 1 months ago
RBAC-PAT: A Policy Analysis Tool for Role Based Access Control
Abstract. Role-Based Access Control (RBAC) has been widely used for expressing access control policies. Administrative Role-Based Access Control (ARBAC) specifies how an RBAC poli...
Mikhail I. Gofman, Ruiqi Luo, Ayla C. Solomon, Yin...