Fuzzy sets and fuzzy logic: theory and applications
Fuzzy sets and fuzzy logic: theory and applications
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
TrustBAC: integrating trust relationships into the RBAC model for access control in open systems
Proceedings of the eleventh ACM symposium on Access control models and technologies
Role-Based Access Control, Second Edition
Role-Based Access Control, Second Edition
Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Fundamentals of Game Design
Dynamic Role-Based Access Control with Trust-Satisfaction and Reputation for Multi-agent System
WAINA '10 Proceedings of the 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops
Reputation and Role Based Access Control Model for Multi-domain Environments
IPTC '10 Proceedings of the 2010 International Symposium on Intelligence Information Processing and Trusted Computing
Fuzzy Role-Based Access Control
Information Processing Letters
A case for relative differentiated services and the proportional differentiation model
IEEE Network: The Magazine of Global Internetworking
Contract RBAC in cloud computing
The Journal of Supercomputing
Hi-index | 0.00 |
Role-Based Access Control is an access control scheme born to accommodate organizational access control policies. Despite RBAC is widely used, it presents some handicaps when accommodating the natural user progression within a system: from low access privileges, when the user is new in the system, to higher access privileges as the user experience grows. In this paper, we build on FRBAC to propose an RBAC-like intra-role user progression scheme inspired in role playing games. User progression will result in progressive abilities acquisition and enhancing, enhancing RBAC with more expressive access control policies.