Report on the first ACM workshop on role-based access control
ACM SIGSAC Review
Mandatory access control and role-based access control revisited
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Future directions in role-based access control
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Information flow inference for free
ICFP '00 Proceedings of the fifth ACM SIGPLAN international conference on Functional programming
Configuring role-based access control to enforce mandatory and discretionary access control policies
ACM Transactions on Information and System Security (TISSEC)
Certification of programs for secure information flow
Communications of the ACM
A lattice model of secure information flow
Communications of the ACM
Role Hierarchies and Constraints for Lattice-Based Access Controls
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
An Object-Oriented RBAC Model for Distributed System
WICSA '01 Proceedings of the Working IEEE/IFIP Conference on Software Architecture
A New Type System for Secure Information Flow
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Hi-index | 0.00 |
In this paper, we conclude that confinement problem may occur on the Object Oriented Role-based Access Control model (ORBAC). In order to solve the problem, a technique called information flow analysis is proposed. Moreover, based on the information flow technique and the principle of mandatory access control principles, a message filtering algorithm and a role set assignment method are developed to deal with the confinement problem on ORBAC.