Lattice-based enforcement of Chinese Walls
Computers and Security
The ARBAC97 model for role-based administration of roles: preliminary description and outline
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Specifying and managing role-based access control within a corporate intranet
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Rationale for the RBAC96 family of access control models
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Constraints for role-based access control
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
The ARBAC97 model for role-based administration of roles
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
Role Hierarchies and Constraints for Lattice-Based Access Controls
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Verification and change-impact analysis of access-control policies
Proceedings of the 27th international conference on Software engineering
International Journal of Computer Integrated Manufacturing
Specifying and reasoning about dynamic access-control policies
IJCAR'06 Proceedings of the Third international joint conference on Automated Reasoning
Hi-index | 0.00 |
The paper presents a short overview of the foundationsof the role-based access control modal model and itsproprieties. In particular,the problem of definition andverification of various types of constraints is analysed.The main benefit of the presented model is that it is basedon the fundamental notions of both enterprisemanagement and information systems access control. Theother important value of the model is the possibility ofautomation of processes and implementation ofmechanisms related to access control on the basis oflogical automated reasoning and the PROLOGprogramming language.