Role-Based Access Control Models
Computer
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Constraints for role-based access control
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
How to do discretionary access control using roles
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
The RSL99 language for role-based separation of duty constraints
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Role-based authorization constraints specification
ACM Transactions on Information and System Security (TISSEC)
Role Hierarchies and Constraints for Lattice-Based Access Controls
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
A Formal Model for Role-Based Access Control with Constraints
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Secure resource sharing on cross-organization collaboration using a novel trust method
Robotics and Computer-Integrated Manufacturing
International Journal of Computer Integrated Manufacturing
From Formal Access Control Policies to Runtime Enforcement Aspects
ESSoS '09 Proceedings of the 1st International Symposium on Engineering Secure Software and Systems
International Journal of Information and Computer Security
An infrastructural approach to secure interoperability of electronic IDs: the bridging backbone
EGOV'05 Proceedings of the 4th international conference on Electronic Government
Hi-index | 0.00 |
Constraints are an important aspect of role-basedaccess control (RBAC). Although the importance ofconstraints in RBAC has been recognized for a longtime, they have not received much attention. In thispaper we classify RBAC constraints into two majorclasses called prohibition constraints and obligationconstraints. To specify these constraints, we utilize aformal language, named RCL2000. In this paper weshow that prohibition, cardinality, and obligation constraintscan be also represented in RCL2000.