Role-Based Access Control Models
Computer
Authentication, access control, and audit
ACM Computing Surveys (CSUR)
A role-based access control model and reference implementation within a corporate intranet
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
Firewalls Complete
Digital Certificates: Applied Internet Security (with CD-ROM)
Digital Certificates: Applied Internet Security (with CD-ROM)
Binding identities and attributes using digitally signed certificates
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Adaptive speaker identification with audiovisual cues for movie content analysis
Pattern Recognition Letters - Video computing
Hi-index | 0.00 |
Access control is concerned with limiting the activity of legitimate users in an application. Role-based access control (RBAC) uses role to indirectly describe the access rights. This indirectly mapping is very flexible. However, current RBAC models are not suitable to describe fine-grained access control for data-centric enterprise applications. In this paper, we present a pragmatic role-based access control model for data-centric application. The access control is fine-grained and flexible. An object-oriented implementation is also presented. Users are identified by digital certificates. The proposed model is designed for three-tier enterprise application.