Role-Based Access Control Models
Computer
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
The role graph model and conflict of interest
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
A role-based access control model and reference implementation within a corporate intranet
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
The ARBAC97 model for role-based administration of roles
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
The RSL99 language for role-based separation of duty constraints
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Configuring role-based access control to enforce mandatory and discretionary access control policies
ACM Transactions on Information and System Security (TISSEC)
Lattice-Based Access Control Models
Computer
Results of the IFIP WG 11.3 Workshop on Database Security V: Status and Prospects
Separation of Duty in Role-based Environments
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Rebuttal to the NIST RBAC model proposal
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Fine grained access control for SOAP E-services
Proceedings of the 10th international conference on World Wide Web
The role-based access control system of a European bank: a case study and discussion
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Structured management of role-permission relationships
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Role-based authorization constraints specification
ACM Transactions on Information and System Security (TISSEC)
ACM SIGOPS Operating Systems Review
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
Design and implementation of a flexible RBAC-service in an object-oriented scripting language
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Role-based access control and the access control matrix
ACM SIGOPS Operating Systems Review
A lightweight approach to specification and analysis of role-based access control extensions
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Administrative scope and role hierarchy operations
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A graph-based formalism for RBAC
ACM Transactions on Information and System Security (TISSEC)
Context sensitivity in role-based access control
ACM SIGOPS Operating Systems Review
A logical framework for reasoning about access control models
ACM Transactions on Information and System Security (TISSEC)
Protecting deductive databases from unauthorized retrieval and update requests
Data & Knowledge Engineering - Data and applications security
Multiversion Locking Protocol with Freezing for Secure Real-Time Database Systems
IEEE Transactions on Knowledge and Data Engineering
Access Control for Deductive Databases by Logic Programming
ICLP '02 Proceedings of the 18th International Conference on Logic Programming
UNITE - An Agent-Oriented Teamwork Environment
MATA '02 Proceedings of the 4th International Workshop on Mobile Agents for Telecommunication Applications
XML-Based Distributed Access Control System
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Web Document Access Control Using Two-Layered Storage Structures with RBAC Server
EurAsia-ICT '02 Proceedings of the First EurAsian Conference on Information and Communication Technology
Future Directions in Role-Based Access Control Models
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Administrative scope: A foundation for role-based administrative models
ACM Transactions on Information and System Security (TISSEC)
Scientific papers: role-based authorizations using mobile agents in healthcare organizations
Technology and Health Care - Special issue: Qualit-e-health
The PERMIS X.509 role based privilege management infrastructure
Future Generation Computer Systems - Special section: Selected papers from the TERENA networking conference 2002
On modeling system-centric information for role engineering
Proceedings of the eighth ACM symposium on Access control models and technologies
Role mining - revealing business roles for security administration using data mining technology
Proceedings of the eighth ACM symposium on Access control models and technologies
Access control: principles and solutions
Software—Practice & Experience - Special issue: Security software
Formal description of perfect security
ICCC '02 Proceedings of the 15th international conference on Computer communication
Secure role-based workflow models
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Generalized Role-Based Access Control
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
A System to Specify and Manage Multipolicy Access Control Models
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Meta-Policies for Distributed Role-Based Access Control Systems
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Flexible access control policy specification with constraint logic programming
ACM Transactions on Information and System Security (TISSEC)
A role administration system in role-based authorization infrastructures: design and implementation
Proceedings of the 2003 ACM symposium on Applied computing
Extending TINA with Secure On-Line Accounting Services
Journal of Network and Systems Management
Role-Based Access Controls: Status, Dissemination, and Prospects for Generic Security Mechanisms
Electronic Commerce Research
A policy-based security framework for Web-enabled applications
ISICT '03 Proceedings of the 1st international symposium on Information and communication technologies
A propositional logic for access control policy in distributed systems
Artificial intelligence and security in computing systems
An architecture for supporting vicarious learning in a distributed environment
Proceedings of the 2004 ACM symposium on Applied computing
On the role of roles: from role-based to role-sensitive access control
Proceedings of the ninth ACM symposium on Access control models and technologies
Administrative scope in the graph-based framework
Proceedings of the ninth ACM symposium on Access control models and technologies
A composite rbac approach for large, complex organizations
Proceedings of the ninth ACM symposium on Access control models and technologies
Efficient and flexible access control via logic program specialisation
Proceedings of the 2004 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation
Specification and querying of security constraints in the EFSOC framework
Proceedings of the 2nd international conference on Service oriented computing
A Flexible Payment Scheme and Its Role-Based Access Control
IEEE Transactions on Knowledge and Data Engineering
A scalable authorization approach for the Globus grid system
Future Generation Computer Systems - Special issue: Advanced grid technologies
GEO-RBAC: a spatially aware RBAC
Proceedings of the tenth ACM symposium on Access control models and technologies
Purpose based access control of complex data for privacy protection
Proceedings of the tenth ACM symposium on Access control models and technologies
ACM Transactions on Information and System Security (TISSEC)
Mediation security specification and enforcement for heterogeneous databases
Proceedings of the 2005 ACM symposium on Applied computing
Social Serendipity: Mobilizing Social Software
IEEE Pervasive Computing
PRES: a practical flexible RBAC workflow system
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
Core role-based access control: efficient implementations by transformations
Proceedings of the 2006 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation
AutoMate: Enabling Autonomic Applications on the Grid
Cluster Computing
An extended RBAC profile of XACML
Proceedings of the 3rd ACM workshop on Secure web services
Applying role based access control and genetic algorithms to insider threat detection
Proceedings of the 44th annual Southeast regional conference
GEO-RBAC: A spatially aware RBAC
ACM Transactions on Information and System Security (TISSEC)
ACM Transactions on Information and System Security (TISSEC)
Visual modeling and formal specification of constraints of RBAC using semantic web technology
Knowledge-Based Systems
Developing secure data warehouses with a UML extension
Information Systems
Beyond purpose-based privacy access control
ADC '07 Proceedings of the eighteenth conference on Australasian database - Volume 63
A Critique of the ANSI Standard on Role-Based Access Control
IEEE Security and Privacy
RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control"
IEEE Security and Privacy
Data security in location-aware applications: an approach based on RBAC
International Journal of Information and Computer Security
Access control by action control
Proceedings of the 13th ACM symposium on Access control models and technologies
Efficient and flexible access control via Jones-optimal logic program specialisation
Higher-Order and Symbolic Computation
Purpose based access control for privacy protection in relational database systems
The VLDB Journal — The International Journal on Very Large Data Bases
Detecting anomalous access patterns in relational databases
The VLDB Journal — The International Journal on Very Large Data Bases
A rewriting framework for the composition of access control policies
Proceedings of the 10th international ACM SIGPLAN conference on Principles and practice of declarative programming
Facilitating asynchronous discussions in learning communities: the impact of moderation strategies
Behaviour & Information Technology - Computer Support for Learning Communities
Regulating Exceptions in Healthcare Using Policy Spaces
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Securing Workflows with XACML, RDF and BPEL
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Preventing conflict situations during authorization
WSEAS Transactions on Computers
Situation-Based Access Control: Privacy management via modeling of patient data access scenarios
Journal of Biomedical Informatics
From Formal Access Control Policies to Runtime Enforcement Aspects
ESSoS '09 Proceedings of the 1st International Symposium on Engineering Secure Software and Systems
Specification and enforcement of flexible security policy for active cooperation
Information Sciences: an International Journal
The Design of a New Policy Model to Support Ontology-Driven Reasoning for Autonomic Networking
Journal of Network and Systems Management
StreamShield: a stream-centric approach towards security and privacy in data stream environments
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Collaboration support by co-ownership of documents
Proceedings of the 2006 conference on Cooperative Systems Design: Seamless Integration of Artifacts and Conversations -- Enhanced Concepts of Infrastructure for Communication
Law-aware access control for international financial environments
Proceedings of the Eighth ACM International Workshop on Data Engineering for Wireless and Mobile Access
Access Policy Design Supported by FCA Methods
ICCS '09 Proceedings of the 17th International Conference on Conceptual Structures: Conceptual Structures: Leveraging Semantic Technologies
V-model approach for role engineering
ICCOMP'09 Proceedings of the WSEAES 13th international conference on Computers
Applying quorum role in network management
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Believing the Integrity of a System
Electronic Notes in Theoretical Computer Science (ENTCS)
A closer look to the V-model approach for role engineering
WSEAS Transactions on Computers
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
Cryptographic role-based security mechanisms based on role-key hierarchy
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Visual specifications of policies and their verification
FASE'03 Proceedings of the 6th international conference on Fundamental approaches to software engineering
Design and implementation of access control system for smart office environment
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Analysis of ANSI RBAC Support in COM+
Computer Standards & Interfaces
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Modular context-aware access control for medical sensor networks
Proceedings of the 15th ACM symposium on Access control models and technologies
Access control caching strategies: an empirical evaluation
Proceedings of the 6th International Workshop on Security Measurements and Metrics
Architecture for production and collaboration of TV content on the Internet
WebMedia '09 Proceedings of the XV Brazilian Symposium on Multimedia and the Web
Role-based differentiation for insider detection algorithms
Proceedings of the 2010 ACM workshop on Insider threats
User-role reachability analysis of evolving administrative role based access control
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
A data-centric approach to insider attack detection in database systems
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Privilege states based access control for fine-grained intrusion response
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Security policies in distributed CSCW and workflow systems
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Security architecture and methodology for authorisation of mobile agents
International Journal of Internet Technology and Secured Transactions
Proceedings of the first ACM conference on Data and application security and privacy
Access Control for Databases: Concepts and Systems
Foundations and Trends in Databases
Editorial: Using OWL and SWRL to represent and reason with situation-based access control policies
Data & Knowledge Engineering
Evaluating access control of open source electronic health record systems
Proceedings of the 3rd Workshop on Software Engineering in Health Care
Applying a usage control model in an operating system kernel
Journal of Network and Computer Applications
Challenges in model-based evolution and merging of access control policies
Proceedings of the 12th International Workshop on Principles of Software Evolution and the 7th annual ERCIM Workshop on Software Evolution
Tool support for UML-based specification and verification of role-based access control properties
Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
Modularisation in maude of parametrized RBAC for row level access control
ADBIS'11 Proceedings of the 15th international conference on Advances in databases and information systems
Enterprise monitoring ontology
ER'11 Proceedings of the 30th international conference on Conceptual modeling
Role assignment in institutional clouds for rule-based enterprise management
RuleML'11 Proceedings of the 5th international conference on Rule-based modeling and computing on the semantic web
Term rewriting for access control
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Flexible workflow incorporated with RBAC
CSCWD'05 Proceedings of the 9th international conference on Computer Supported Cooperative Work in Design II
Using labeling to prevent cross-service attacks against smart phones
DIMVA'06 Proceedings of the Third international conference on Detection of Intrusions and Malware & Vulnerability Assessment
Role activation management in role based access control
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Context data abstraction framework using RDF
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
UCONLEGAL: a usage control model for HIPAA
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium
The conflict detection between permission assignment constraints in role-based access control
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
A semantic context-aware access control in pervasive environments
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
OS-DRAM: a delegation administration model in a decentralized enterprise environment
WAIM '06 Proceedings of the 7th international conference on Advances in Web-Age Information Management
An access control language for dynamic systems – model-driven development and verification
SDL'05 Proceedings of the 12th international conference on Model Driven
Development of a flexible PERMIS authorisation module for shibboleth and apache server
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
A formal enforcement framework for role-based access control using aspect-oriented programming
MoDELS'05 Proceedings of the 8th international conference on Model Driven Engineering Languages and Systems
Unauthorized inferences in semistructured databases
Information Sciences: an International Journal
Coordination, conventions and the self-organisation of sustainable institutions
PRIMA'11 Proceedings of the 14th international conference on Agents in Principle, Agents in Practice
Aspect weaving in UML activity diagrams: a semantic and algorithmic framework
FACS'10 Proceedings of the 7th international conference on Formal Aspects of Component Software
Using timed colored petri nets and CPN-tool to model and verify TRBAC security policies
VECoS'10 Proceedings of the Fourth international conference on Verification and Evaluation of Computer and Communication Systems
Using ontology-based methods for implementing role-based access control in cooperative systems
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Policy-by-example for online social networks
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Decentralized governance of distributed systems via interaction control
Logic Programs, Norms and Action
Role-Based access control for model-driven web applications
ICWE'12 Proceedings of the 12th international conference on Web Engineering
BTA: architecture for reusable business tier components with access control
ICCSA'12 Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part III
Access control hygiene and the empathy gap in medical IT
HealthSec'12 Proceedings of the 3rd USENIX conference on Health Security and Privacy
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section: Extended Version of SASO 2011 Best Paper
Access control for semantic data federations in industrial product-lifecycle management
Computers in Industry
A model-driven approach for the extraction of network access-control policies
Proceedings of the Workshop on Model-Driven Security
Context-Aware Identity Management in Pervasive Ad-hoc Environments
International Journal of Advanced Pervasive and Ubiquitous Computing
A new approach for delegation in usage control
Proceedings of the third ACM conference on Data and application security and privacy
The design of intelligent socio-technical systems
Artificial Intelligence Review
Managing access control for things: a capability based approach
Proceedings of the 7th International Conference on Body Area Networks
Towards Security Assurance in Round-Trip Engineering: A Type-Based Approach
Electronic Notes in Theoretical Computer Science (ENTCS)
Nephele: Scalable Access Control for Federated File Services
Journal of Grid Computing
Secure Electronic Healthcare Records Management in Wireless Environments
Journal of Information Technology Research
An effective and secure web banking system: development and evaluation
International Journal of Business Information Systems
Position paper: cloud-based performance testing: issues and challenges
Proceedings of the 2013 international workshop on Hot topics in cloud services
Heuristic safety analysis of access control models
Proceedings of the 18th ACM symposium on Access control models and technologies
Extensible access control markup language integrated with Semantic Web technologies
Information Sciences: an International Journal
Secure federation of semantic information services
Decision Support Systems
Usable object management approaches for online social networks
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Business Driven User Role Assignment: Nimble Adaptation of RBAC to Organizational Changes
International Journal of Information Security and Privacy
Journal of Network and Computer Applications
Annotation processes for flexible management of contextual information
Journal of Visual Languages and Computing
The RBAC model and implementation architecture in multi-domain environment
Electronic Commerce Research
Hi-index | 0.00 |
This paper describes a unified model for role-based access control (RBAC). RBAC is a proven technology for large-scale authorization. However, lack of a standard model results in uncertainty and confusion about its utility and meaning. The NIST model seeks to resolve this situation by unifying ideas from prior RBAC models, commercial products and research prototypes. It is intended to serve as a foundation for developing future standards. RBAC is a rich and open-ended technology which is evolving as users, researchers and vendors gain experience with it. The NIST model focuses on those aspects of RBAC for which consensus is available. It is organized into four levels of increasing functional capabilities called flat RBAC, hierarchical RBAC, constrained RBAC and symmetric RBAC. These levels are cumulative and each adds exactly one new requirement. An alternate approach comprising flat and hierarchical RBAC in an ordered sequence and two unordered features—constraints and symmetry—is also presented. The paper furthermore identifies important attributes of RBAC not included in the NIST model. Some are not suitable for inclusion in a consensus document. Others require further work and agreement before standardization is feasible.