Role-Based Access Control Models
Computer
Towards a more complete model of role
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Role delegation in role-based access control
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Certificate Based Authorization Simulation System
COMPSAC '01 Proceedings of the 25th International Computer Software and Applications Conference on Invigorating Software Development
PBDM: a flexible delegation model in RBAC
Proceedings of the eighth ACM symposium on Access control models and technologies
Binding identities and attributes using digitally signed certificates
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Framework for role-based delegation models
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Generalized Role-Based Access Control
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
A rule-based framework for role-based delegation and revocation
ACM Transactions on Information and System Security (TISSEC)
A framework for modeling restricted delegation in service oriented architecture
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Hi-index | 0.00 |
The rapid increase on the circulation of data over the web has highlighted the need for distributed storage of Internet-accessible information due to the rapid increase on the circulation of data over the web Thus, access control mechanisms should also be distributed in order to protect them effectively A recent idea in the access control theory is the delegation and revocation of rights, i.e the passing over of one clients rights to the other and vice versa Here, we propose an XML-based distributed delegation module which can be integrated into a distributed role-based access control mechanism protecting networks The idea of X.509v3 certificates is used for the transfer of authorization information referring to a client The modules are XML-based and all of the associated data structures are expressed through Document Type Definitions (DTDs).