Role-Based Access Control Models
Computer
Role-based access control on the web
ACM Transactions on Information and System Security (TISSEC)
A model of OASIS role-based access control and its support for active security
ACM Transactions on Information and System Security (TISSEC)
Dependencies and separation of duty constraints in GTRBAC
Proceedings of the eighth ACM symposium on Access control models and technologies
Generalized Role-Based Access Control
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
Role based access control for a medical database
SEA '07 Proceedings of the 11th IASTED International Conference on Software Engineering and Applications
Hi-index | 0.00 |
Efficient and effective web gateways or proxy servers are important to control the access privileges of users and protect private networks that are connected to the Internet, thus providing a productive and safe web environment. Access control in the form of complex access rules based on users or user sets (groups) has been studied extensively. The objective of this work is to provide role-based (RB) security for web gateways utilizing Role-Based Access Control (RBAC). RB security reduces the administrative burden, provides fine grained access control and supports various constraints such as context-aware and temporal seamlessly.In this paper we elaborate on the problems, issues that need to be addressed, and our approach for providing RB security for web gateways by leveraging the flexibility and expressiveness of RBAC. Our approach enables the proxy server to act smarter, rather than just allow or deny access based on access rules, meanwhile preserving the principle of least privileges.