Role-Based Access Control Models
Computer
The role graph model and conflict of interest
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
The NIST model for role-based access control: towards a unified standard
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Towards usage control models: beyond traditional access control
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Framework for role-based delegation models
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Usage control: a unified framework for next generation access control
Usage control: a unified framework for next generation access control
The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
Delegation in the role graph model
Proceedings of the eleventh ACM symposium on Access control models and technologies
Formal model and analysis of usage control
Formal model and analysis of usage control
Research on Usage Control Model with Delegation Characteristics Based on OM-AM Methodology
NPC '07 Proceedings of the 2007 IFIP International Conference on Network and Parallel Computing Workshops
A general obligation model and continuity: enhanced policy enforcement engine for usage control
Proceedings of the 13th ACM symposium on Access control models and technologies
An Improved Scheme for Delegation Based on Usage Control
FGCN '08 Proceedings of the 2008 Second International Conference on Future Generation Communication and Networking - Volume 01
An administrative model for UCONABC
AISC '10 Proceedings of the Eighth Australasian Conference on Information Security - Volume 105
Static and Dynamic Delegation in the Role Graph Model
IEEE Transactions on Knowledge and Data Engineering
Hi-index | 0.00 |
UCON (Usage Control), a recent access control model, allows temporal control of the usage of permissions according to three criteria: Authorizations, oBligations and Conditions. In this paper, we investigate delegation in UCON and propose a new approach to achieve user-user total and partial delegations with the enforcement of constraints by taking advantage of UCON's existing components: Authorizations, oBligations and Conditions. The approach we propose can be modified and extended, without much effort, to other access control models accommodated by UCON and to a distributed environment.