Role-Based Access Control Models
Computer
On the interaction between role-based access control and relational databases
Proceedings of the tenth annual IFIP TC11/WG11.3 international conference on Database security: volume X : status and prospects: status and prospects
How to do discretionary access control using roles
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
The role graph model and conflict of interest
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
Modeling users in role-based access control
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Delegation in the role graph model
Proceedings of the eleventh ACM symposium on Access control models and technologies
Towards System Integrity Protection with Graph-Based Policy Analysis
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
Hi-index | 0.00 |
Previous research examining the mapping of discretionary access control (DAC) to role-based access control (RBAC) has considered neither ownership nor further granting of privileges. We show how to accomplish this by mapping from a relational database environment to the administrative role graph model (ARGM) of Wang and Osborn. The goals of the research are to determine if the ARGM has sufficient features to accomplish this mapping, and to study whether the grant operation in relational databases should be modeled as administration or as delegation. Our conclusion is that the ARGM can simulate both ownership and granting, without requiring a delegation model.