Role-Based Access Control Models
Computer
RIPEMD-160: A Strengthened Version of RIPEMD
Proceedings of the Third International Workshop on Fast Software Encryption
SESAME V2 public key and authorisation extensions to Kerberos
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
Managing security policies in a distributed environment using eXtensible markup language (XML)
Proceedings of the 2001 ACM symposium on Applied computing
An architecture for supporting vicarious learning in a distributed environment
Proceedings of the 2004 ACM symposium on Applied computing
A function-based user authority delegation model
Information Sciences: an International Journal
Supporting dynamically changing authorizations in pervasive communication systems
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Applying authorization to intranets: architectures, issues and APIs
Computer Communications
Hi-index | 0.00 |
Abstract: The authors share their experiences with implementing a scheme that enforces role-based access control in a distributed heterogeneous computing environment. This work was done in the framework of the EC RACE project SESAME (Secure European System in A Multivendor Environment). The SESAME project relies on the work done by ECMA (European Computer Manufacturers Association) to represent the credentials of the users, and it fully supports a GSS (group support system) API to help the application developers. We conclude that enforcing such a scheme is realistic and that writing applications that benefit from the advantages of role-based access control is very feasible. We have built several demonstration applications.