Rule support for role-based access control
Proceedings of the tenth ACM symposium on Access control models and technologies
A dynamic key management solution to access hierarchy
International Journal of Network Management
Personalized access control for a personally controlled health record
Proceedings of the 2nd ACM workshop on Computer security architectures
Preventing conflict situations during authorization
WSEAS Transactions on Computers
Belnap's Logic in Sharing Protected Web Resources
KES '07 Knowledge-Based Intelligent Information and Engineering Systems and the XVII Italian Workshop on Neural Networks on Proceedings of the 11th International Conference
Automating role-based provisioning by learning from examples
Proceedings of the 14th ACM symposium on Access control models and technologies
Research on Description Logic Based Conflict Detection Methods for RB-RBAC Model
Proceedings of the 2006 conference on Advances in Intelligent IT: Active Media Technology 2006
Positive and negative authorizations to access protected web resources
NBiS'07 Proceedings of the 1st international conference on Network-based information systems
Supporting role based provisioning with rules using OWL and F-logic
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems - Volume Part I
Using description logic to determine seniority among RB-RBAC authorization rules
RSKT'06 Proceedings of the First international conference on Rough Sets and Knowledge Technology
Role-Based delegation with negative authorization
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
Sharing protected web resources using distributed role-based modeling
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
An OWL-Based approach for RBAC with negative authorization
KSEM'06 Proceedings of the First international conference on Knowledge Science, Engineering and Management
Automated and efficient analysis of role-based access control with attributes
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Hi-index | 0.00 |
RBAC has proven to be a flexible and useful access control model in practice. Rule-Based RBAC family of models was developed based on RBAC to overcome some of its limitations. One particular model of this family, which we call RB-RBAC-ve, introduces the concept of negative authorization to the RBAC arena. This paper provides a more detailed analysis of RB-RBAC-ve. The analysis includes user authorization, conflict among rules, conflict resolution polices, the impact of negative authorization on role hierarchies and enforcement architecture.