Network security via private-key certificates
ACM SIGOPS Operating Systems Review
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
Role-Based Access Control Models
Computer
Design systolic systems: Illustrating of regular algorithms on synchronous array processors
Design systolic systems: Illustrating of regular algorithms on synchronous array processors
Towards A Role-Based Framework for DistributedSystems Management
Journal of Network and Systems Management
Management Policy Service for Distributed Systems
SDNE '96 Proceedings of the 3rd Workshop on Services in Distributed and Networked Environments (SDNE '96)
A Security Framework Supporting Domain Based Access Control in Distributed Systems
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
Integrating security in CORBA based object architectures
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Reconciling role based management and role based access control
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
SafeBots: a paradigm for software security controls
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Role delegation in role-based access control
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Context sensitivity in role-based access control
ACM SIGOPS Operating Systems Review
WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
Working Group Report on Application Security
WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
Role-based access control on the web using LDAP
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Role-based authorization in decentralized health care environments
Proceedings of the 2003 ACM symposium on Applied computing
A review of information security issues and respective research contributions
ACM SIGMIS Database
Access Control Management for SCADA Systems
IEICE - Transactions on Information and Systems
A security policy framework for context-aware and user preferences in e-services
Journal of Systems Architecture: the EUROMICRO Journal
Hi-index | 0.00 |
The paper describes a security architecture designed to support role based access control for distributed object systems in a large scale, multi-organisational enterprise in which domains are used to group objects for specifying security policies. We use the concept of a role to define access control related to a position within an organisation although our role framework caters for the specification of both authorisation and obligation policies. Access control and authentication is implemented using security agents on a per host basis to achieve a high degree of transparency to the application level. Cascaded delegation of access rights is also supported. The domain based authentication service uses symmetric cryptography and is implemented by replicated servers which maintain minimal state.