Supporting relationships in access control using role based access control
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
TRBAC: A temporal role-based access control model
ACM Transactions on Information and System Security (TISSEC)
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
Separation of Duty in Role-based Environments
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Role-Based Access Control
An integrated approach to engineer and enforce context constraints in RBAC environments
ACM Transactions on Information and System Security (TISSEC)
Role-Based Delegation Model/ Hierarchical Roles (RBDM1)
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
LoT-RBAC: a location and time-based RBAC model
WISE'05 Proceedings of the 6th international conference on Web Information Systems Engineering
Flexible authentication framework with bound authentication and authorization
WSEAS TRANSACTIONS on COMMUNICATIONS
Hi-index | 0.00 |
Enterprise Identity Management (IDM) systems promise users to be equipped with a single enterprise identity and administrators with better users management environment. That increases security, provides the organizations with value-added data and money saving in user management. In fact, in order to do collaboration among independent organizations, each participant must first have a working IDM installment. This work discusses improvement of user management in networked systems. Group-role relations are used to facilitate users with an access control and permissions to different resources.