How to do discretionary access control using roles
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
Access Rights Administration in Role-Based Security Systems
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
Trusted Computing-Based Security Architecture For 4G Mobile Networks
PDCAT '05 Proceedings of the Sixth International Conference on Parallel and Distributed Computing Applications and Technologies
Hi-index | 0.00 |
Secure model is a core aspect in trusted information system and a key research field of trusted computing. Based on the extensive research of the Role Based Access Control (RBAC) model and the security operating system standards, we put forward the concept of homonymous role, which extends the control categories of the role in RBAC, balances the control granularity and the storage space requirement, and carries the detailed access control into execution. Based on the homonymous role, we also facilitate the homonymous control domain capability in the Discretionary Access Control (DAC) system. Finally, we design and implement our homonymous control domain on FreeBSD to enhance the flexibility of the access control.