Role-Based Access Control Models
Computer
A role-based access control model and reference implementation within a corporate intranet
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
An authorization model for temporal data
Proceedings of the 7th ACM conference on Computer and communications security
Protection in operating systems
Communications of the ACM
TRBAC: A temporal role-based access control model
ACM Transactions on Information and System Security (TISSEC)
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
Safety Analysis of the Dynamic-Typed Access Matrix Model
ESORICS '00 Proceedings of the 6th European Symposium on Research in Computer Security
ACM SIGOPS Operating Systems Review
Role-Based Access Control
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Hi-index | 0.00 |
Most of access control mechanisms use the matrix model to represent protection states of computer systems. We present a variant of the access control matrix model obtained by incorporating temporal constraints saying that “subject s has right r on object o since at least duration d”. In connection with this enriched model, we also discuss the decidable and undecidable cases of one of the major themes of computer security, namely the classical safety problem for access control matrices.