Specification of management policies and discretionary access control
Network and distributed systems management
Role-Based Access Control Models
Computer
Control principles and role hierarchies
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
The ARBAC97 model for role-based administration of roles
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
The role-based access control system of a European bank: a case study and discussion
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
Observations on the role life-cycle in the context of enterprise security management
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A model for role administration using organization structure
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
The ARBAC99 Model for Administration of Roles
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
Advanced Features for Enterprise-Wide Role-Based Access Control
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
A Model for Attribute-Based User-Role Assignment
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
The Authorization Service of Tivoli Policy Director
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Role-based administration of user-role assignment: The URA97 model and its Oracle implementation
Journal of Computer Security
Proceedings of the 2004 ACM symposium on Applied computing
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Proceedings of the ninth ACM symposium on Access control models and technologies
Proceedings of the ninth ACM symposium on Access control models and technologies
Administration in role-based access control
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Secure resource sharing on cross-organization collaboration using a novel trust method
Robotics and Computer-Integrated Manufacturing
Efficient policy analysis for administrative role based access control
Proceedings of the 14th ACM conference on Computer and communications security
RBAC administration in distributed systems
Proceedings of the 13th ACM symposium on Access control models and technologies
Security Challenges in Adaptive e-Health Processes
SAFECOMP '08 Proceedings of the 27th international conference on Computer Safety, Reliability, and Security
Spatial Domains for the Administration of Location-based Access Control Policies
Journal of Network and Systems Management
Supporting dynamic administration of RBAC in web-based collaborative applications during run-time
International Journal of Information and Computer Security
An adaptive security model using agent-oriented MDA
Information and Software Technology
International Journal of Computer Integrated Manufacturing
Specification and enforcement of flexible security policy for active cooperation
Information Sciences: an International Journal
Evaluating role mining algorithms
Proceedings of the 14th ACM symposium on Access control models and technologies
Towards automatic update of access control policy
LISA'10 Proceedings of the 24th international conference on Large installation system administration
Efficient symbolic automated analysis of administrative attribute-based RBAC-policies
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Program synthesis in administration of higher-order permissions
Proceedings of the 16th ACM symposium on Access control models and technologies
Analyzing temporal role based access control models
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Hi-index | 0.00 |
Using an underlying role-based model for the administration of roles has proved itself to be a successful approach. This paper sets out to describe the enterprise role-based access control model (ERBAC) in the context of SAM Jupiter, a commercial enterprise security management software.We provide an overview of the role-based conceptual model underlying SAM Jupiter. Having established this basis, we describe how the model is used to facilitate a role-based administration approach. In particular, we discuss our notion of 'scopes', which describe the objects over which an administrator has authority. The second part provides a case study based on our real-world experiences in the implementation of role-based administrative infrastructures. Finally, a critical evaluation and comparison with current approaches to administrative role-based access control is provided.