Role-Based Access Control Models
Computer
A unified framework for enforcing multiple access control policies
SIGMOD '97 Proceedings of the 1997 ACM SIGMOD international conference on Management of data
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
High security Web servers and gateways
Selected papers from the sixth international conference on World Wide Web
A role-based access control model and reference implementation within a corporate intranet
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
The ARBAC97 model for role-based administration of roles
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
Supporting reconfigurable security policies for mobile programs
Proceedings of the 9th international World Wide Web conference on Computer networks : the international journal of computer and telecommunications netowrking
Using digital credentials on the World Wide Web
Journal of Computer Security - Special issue on security in the World Wide Web
Lattice-Based Access Control Models
Computer
Issues in the Design of a Language for Role Based Access Control
ICICS '99 Proceedings of the Second International Conference on Information and Communication Security
Reasoning About Security: A Logic and a Decision Method for Role-Based Access Control
ECSQARU/FAPR '97 Proceedings of the First International Joint Conference on Qualitative and Quantitative Practical Reasoning
Authorization and Attribute Certificates for Widely Distributed Access Control
WETICE '98 Proceedings of the 7th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Elements of a Language for Role-Based Access Control
Proceedings of the IFIP TC11 Fifteenth Annual Working Conference on Information Security for Global Information Infrastructures
A Formal Model for Role-Based Access Control with Constraints
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
A Logic-based Knowledge Representation for Authorization with Delegation
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Authorization for Metacomputing Applications
HPDC '98 Proceedings of the 7th IEEE International Symposium on High Performance Distributed Computing
Certificate-based access control for widely distributed resources
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Security in enterprise networking: A quick tour
IEEE Communications Magazine
Hi-index | 0.00 |
This paper proposes a knowledge-based approach to Internet authorizations using Public-Key Infrastructure (PKI) based digital certificates and Role-Based Access Control (RBAC). First, we introduce several existing access control models. Second, a logic-based policy specification language is given. Third, a policy-driven RBAC is presented. Fourth, a method of automatically assigning roles to users using digital certificates is discussed. Then, the architecture for Internet authorizations is described. Finally, a solution to remote policy enforcement is proposed. We also give the syntax of a role definition language and illustrate it in appendices A and B, respectively.