Role-Based Access Control Models
Computer
The ARBAC97 model for role-based administration of roles: preliminary description and outline
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Role-based access control: a natural approach
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Towards a more complete model of role
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
A role-based access control model and reference implementation within a corporate intranet
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
ACM SIGAda Ada Letters
A model of OASIS role-based access control and its support for active security
ACM Transactions on Information and System Security (TISSEC)
Access Rights Administration in Role-Based Security Systems
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
The Ponder Policy Specification Language
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
Policy Contexts: Controlling Information Flow in Parameterised RBAC
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
Meta-Policies for Distributed Role-Based Access Control Systems
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Hi-index | 0.00 |
Role-based access control has been a focal area formany security researchers over the last decade. There havebeen a large number of models, and many rich specificationlanguages. However there has been little attention paid tothe way in which access control policy is stored persistently.This paper investigates policy storage from the perspectiveof access control to the policy itself, and of its distributedadministration.