Role-Based Access Control Models
Computer
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Role templates for content-based access control
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Formal specification for role based access control user/role and role/role relationship management
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
A role-based access control model and reference implementation within a corporate intranet
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
Managing trust between collaborating companies using outsourced role based access control
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
A model of accountability, confidentiality and override for healthcare and other applications
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Flexible team-based access control using contexts
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
A rule-based framework for role based delegation
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
Separation of Duty in Role-based Environments
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
A security policy model for clinical information systems
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A rule-based framework for role-based delegation and revocation
ACM Transactions on Information and System Security (TISSEC)
A composite rbac approach for large, complex organizations
Proceedings of the ninth ACM symposium on Access control models and technologies
Supporting conditional delegation in secure workflow management systems
Proceedings of the tenth ACM symposium on Access control models and technologies
Delegation in the role graph model
Proceedings of the eleventh ACM symposium on Access control models and technologies
A framework for role-based group deligation in distributed environments
ACSC '06 Proceedings of the 29th Australasian Computer Science Conference - Volume 48
Modeling Delegation through an i*-based Approach
IAT '06 Proceedings of the IEEE/WIC/ACM international conference on Intelligent Agent Technology
Pervasive healthcare and wireless health monitoring
Mobile Networks and Applications
Using wireless technologies in healthcare
International Journal of Mobile Communications
Commitment issues in delegation process
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
Patterns and Pattern Diagrams for Access Control
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Secure Interaction Models for the HealthAgents System
SAFECOMP '08 Proceedings of the 27th international conference on Computer Safety, Reliability, and Security
Protecting Information Sharing in Distributed Collaborative Environment
Advanced Web and NetworkTechnologies, and Applications
Extending access control models with break-glass
Proceedings of the 14th ACM symposium on Access control models and technologies
Delegating revocations and authorizations in collaborative business environments
Information Systems Frontiers
Trading in risk: using markets to improve access control
Proceedings of the 2008 workshop on New security paradigms
Role based access control for a medical database
SEA '07 Proceedings of the 11th IASTED International Conference on Software Engineering and Applications
Towards a security policy for ubiquitous healthcare systems
ICUCT'06 Proceedings of the 1st international conference on Ubiquitous convergence technology
Delegating revocations and authorizations
BPM'07 Proceedings of the 2007 international conference on Business process management
Capability-based delegation model in RBAC
Proceedings of the 15th ACM symposium on Access control models and technologies
Providing an additional factor for patient identification based on digital fingerprint
HealthSec'11 Proceedings of the 2nd USENIX conference on Health security and privacy
Securing electronic medical records using attribute-based encryption on mobile devices
Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
Delegation in a distributed healthcare context: a survey of current approaches
ISC'06 Proceedings of the 9th international conference on Information Security
Protecting personal data with various granularities: a logic-based access control approach
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Role-Based delegation with negative authorization
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
Secure and efficient information sharing in multi-university E-Learning environments
ICWL'07 Proceedings of the 6th international conference on Advances in web based learning
The Secure Authorization Model for Healthcare Information System
Journal of Medical Systems
Behavior-based access control for distributed healthcare systems
Journal of Computer Security
Hi-index | 0.00 |
As organizations implement information strategies that call for sharing access to resources in the networked environment, mechanisms must be provided to protect the resources from adversaries. The proposed delegation framework addresses the issue of how to advocate selective information sharing in role-based systems while minimizing the risks of unauthorized access. We introduce a systematic approach to specify delegation and revocation policies using a set of rules. We demonstrate the feasibility of our framework through policy specification, enforcement, and a proof-of-concept implementation on specific domains, e.g. the healthcare environment. We believe that our work can be applied to organizations that rely heavily on collaborative tasks.