RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Lattice-Based Access Control Models
Computer
Dynamically authorized role-based access control for secure distributed computation
Proceedings of the 2002 ACM workshop on XML security
Access Control for Active Spaces
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Implementing role based access control for federated information systems on the web
ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21
An access control framework for business processes for web services
Proceedings of the 2003 ACM workshop on XML security
First experiences using XACML for access control in distributed systems
Proceedings of the 2003 ACM workshop on XML security
Role-Based Access Control System for Web Services
CIT '04 Proceedings of the The Fourth International Conference on Computer and Information Technology
An Access Control Model for Web Services in Business Process
WI '04 Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence
Synthesising verified access control systems in XACML
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
ACM Transactions on Information and System Security (TISSEC)
A closer look to the V-model approach for role engineering
WSEAS Transactions on Computers
Hi-index | 0.00 |
Significant research has been done in the area of Role Based Access Control [RBAC]. Within this research there has been a thread of work focusing on adding parameters to the role and permissions within RBAC. The primary benefit of parameter support in RBAC comes in the form of a significant increase in specificity in how permissions may be granted. This paper focuses on implementing a parameterized implementation based heavily upon existing standards.