Introduction to algorithms
Role-Based Access Control Models
Computer
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
The uses of role hierarchies in access control
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
TRBAC: A temporal role-based access control model
ACM Transactions on Information and System Security (TISSEC)
Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model
COMPSAC '02 Proceedings of the 26th International Computer Software and Applications Conference on Prolonging Software Life: Development and Redevelopment
Approximation algorithms for combinatorial problems
STOC '73 Proceedings of the fifth annual ACM symposium on Theory of computing
On permissions, inheritance and role hierarchies
Proceedings of the 10th ACM conference on Computer and communications security
A Generalized Temporal Role-Based Access Control Model
IEEE Transactions on Knowledge and Data Engineering
An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environments
WORDS '05 Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems
Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy
Proceedings of the eleventh ACM symposium on Access control models and technologies
On spatio-temporal constraints and inheritance in role-based access control
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Proceedings of the 13th ACM symposium on Access control models and technologies
Consistency checking of role assignments in inter-organizational collaboration
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Set covering problems in role-based access control
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Role-based secure inter-operation and resource usage management in mobile grid systems
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Greedy algorithm for least privilege in RBAC model
COCOA'11 Proceedings of the 5th international conference on Combinatorial optimization and applications
Enforcing access control in workflow systems with a task engineering approach
International Journal of Internet Technology and Secured Transactions
DR BACA: dynamic role based access control for Android
Proceedings of the 29th Annual Computer Security Applications Conference
Hi-index | 0.00 |
The principle of least privilege is a well known design principle to which access control models and systems should adhere. In the context of role-based access control, the principle of least privilege can be implemented through the use of sessions. In this paper, we first define a family of simple role-based models that provide support for multiple hierarchies and temporal constraints. We then investigate a question related to sessions in each of these models: the inter-domain role mapping problem. The question has previously been defined and analyzed in the context of a particular role-based model. We redefine the question and analyze it in the context of a number of different role-based models.