SIGMOD '86 Proceedings of the 1986 ACM SIGMOD international conference on Management of data
Role-Based Access Control Models
Computer
Managing trust between collaborating companies using outsourced role based access control
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
SSH: secure login connections over the internet
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Hi-index | 0.00 |
The implementation of an RBAC system at the TUB led us towards a specific meaning of role-based access control, where decisions regarding user permissions are based on online evaluations of a distributed RBAC model, we call this approach role-based online decision (RoBOD). Requirements of our project partners and the integration of our solution into application environments showed that a number of enabling technologies, i.e. authentication and secure communication, are necessary to employ RBAC in networked application architectures.