A model of authorization for next-generation database systems
ACM Transactions on Database Systems (TODS)
Role-based security, object oriented databases and separation of duty
ACM SIGMOD Record
User-role based security profile for an object-oriented design model
Results of the Sixth Working Conference of IFIP Working Group 11.3 on Database Security on Database security, VI : status and prospects: status and prospects
Results of the IFIP WG 11.3 Workshop on Database Security V: Status and Prospects
The ARBAC97 model for role-based administration of roles: preliminary description and outline
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Rule based database access control—a practical approach
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Decentralized user-role assignment for Web-based intranets
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Role-based access control in Java
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Role-based access control on the Web using Java
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Panel: which access control technique will provide the greatest overall benefit
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
An argument for the role-based access control model
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Role-based authorization constraints specification
ACM Transactions on Information and System Security (TISSEC)
Role-based access control on the web
ACM Transactions on Information and System Security (TISSEC)
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
A Knowledge-Based Approach to Internet Authorizations
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Technology and Health Care
Meta-Policies for Distributed Role-Based Access Control Systems
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Specification and Classification of Role-based Authorization Policies
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Embedding role-based access control model in object-oriented systems to protect privacy
Journal of Systems and Software
Providing flexible access control to an information flow control model
Journal of Systems and Software
A novel use of RBAC to protect privacy in distributed health care information systems
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Authorization constraints specification of RBAC
WISA'07 Proceedings of the 8th international conference on Information security applications
A formal framework for adaptive access control models
Journal on data semantics IX
Role inheritance with object-based DSD
International Journal of Internet Technology and Secured Transactions
Types for security in a mobile world
TGC'05 Proceedings of the 1st international conference on Trustworthy global computing
Conformance checking of RBAC policy and its implementation
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Proceedings of the 50th Annual Southeast Regional Conference
Hi-index | 0.00 |
The aim of this work is to give a formal foundation to the notion of role-based access control through the introduction of a new model and the formal specification of its semantics. The proposed model takes into account all the main topics currently under discussion in this area, including constraints and separation of duties. Moreover, it is suitable both for conceptual design purpose and direct implementation within real systems.