SOSP '91 Proceedings of the thirteenth ACM symposium on Operating systems principles
Access control for collaborative environments
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
Role-Based Access Control Models
Computer
A unified framework for enforcing multiple access control policies
SIGMOD '97 Proceedings of the 1997 ACM SIGMOD international conference on Management of data
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Integrating content-based access mechanisms with hierarchical file systems
OSDI '99 Proceedings of the third symposium on Operating systems design and implementation
The NIST model for role-based access control: towards a unified standard
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
A Temporal Access Control Mechanism for Database Systems
IEEE Transactions on Knowledge and Data Engineering
Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control
VLDB '96 Proceedings of the 22th International Conference on Very Large Data Bases
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Context sensitivity in role-based access control
ACM SIGOPS Operating Systems Review
On the role of roles: from role-based to role-sensitive access control
Proceedings of the ninth ACM symposium on Access control models and technologies
SMARXO: towards secured multimedia applications by adopting RBAC, XML and object-relational database
Proceedings of the 12th annual ACM international conference on Multimedia
Context sensitive access control
Proceedings of the tenth ACM symposium on Access control models and technologies
Proceedings of the tenth ACM symposium on Access control models and technologies
SmartGate: a smart push-pull approach to support role-based security in web gateways
Proceedings of the 2005 ACM symposium on Applied computing
An extended RBAC profile of XACML
Proceedings of the 3rd ACM workshop on Secure web services
Context-aware access to public shared devices
Proceedings of the 1st ACM SIGMOBILE international workshop on Systems and networking support for healthcare and assisted living environments
A dynamic key management solution to access hierarchy
International Journal of Network Management
Archive storage system design for long-term storage of massive amounts of data
IBM Journal of Research and Development
Uncle-Share: Annotation-Based Access Control for Cooperative and Social Systems
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
QACBAC: an owner-centric QoC-aware context-based access control model for pervasive environments
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
RBAC-based access control for privacy protection in pervasive environments
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
A security policy framework for context-aware and user preferences in e-services
Journal of Systems Architecture: the EUROMICRO Journal
Enforcing role based access control model with multimedia signatures
Journal of Systems Architecture: the EUROMICRO Journal
Information protection via environmental data tethers
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Security policies for the visualization of Geo Data
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
A generalized context-based access control model for pervasive environments
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
Context-aware security management system for pervasive computing environment
CONTEXT'07 Proceedings of the 6th international and interdisciplinary conference on Modeling and using context
Context RBAC/MAC access control for ubiquitous environment
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Adaptive security management model in the cloud computing environment
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Architectural mismatch issues in identity management deployment
Proceedings of the Fourth European Conference on Software Architecture: Companion Volume
Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment
Wireless Personal Communications: An International Journal
Identity management mismatch challenges in the Danish municipality administration system
ECSA'10 Proceedings of the 4th European conference on Software architecture
Annotation-based access control for collaborative information spaces
Computers in Human Behavior
Context-Role based access control for context-aware application
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
XML-Based revocation and delegation in a distributed environment
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
A contextual attribute-based access control model
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
Context-Aware provisional access control
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Dynamic security rules for geo data
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Decentralized governance of distributed systems via interaction control
Logic Programs, Norms and Action
Development of mobile hybrid medintegraweb app for interoperation between u-RPMS and HIS
ICCSA'12 Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part III
Situation-based policy enforcement
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Architecture of context-aware integrated security management systems for smart home environment
APNOMS'07 Proceedings of the 10th Asia-Pacific conference on Network Operations and Management Symposium: managing next generation networks and services
Role-Based Human-Computer Interactions
International Journal of Cognitive Informatics and Natural Intelligence
Usable object management approaches for online social networks
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
CAAC -- An Adaptive and Proactive Access Control Approach for Emergencies in Smart Infrastructures
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Hi-index | 0.00 |
Abstract: Generalized Role-Based Access Control (GRBAC) is a new paradigm for creating and maintaining rich access control policies. GRBAC leverages and extends the power of traditional Role-Based Access Control (RBAC) by incorporating subject roles, object roles and environment roles into access control decisions. Subject roles are like traditional RBAC roles: they abstract the security-relevant characteristics of subjects into categories that can be used in defining a security policy. Similarly, object roles abstract the various properties of objects, such as object type (e.g., text, JPEG, executable) or sensitivity level (e.g., classified, top secret) into categories. Environment roles capture environmental information, such as time of day or system load, so it can be used to mediate access control. Together, these three types of roles offer flexibility and expressive power, as well as a degree of usability not found in current access control models.