Sciweavers

26 search results - page 1 / 6
» Adding Attributes to Role-Based Access Control
Sort
View
COMPUTER
2010
91views more  COMPUTER 2010»
13 years 11 months ago
Adding Attributes to Role-Based Access Control
D. Richard Kuhn, Edward J. Coyne, Timothy R. Weil
IPCCC
2007
IEEE
14 years 5 months ago
Applications of the Oriented Permission Role-Based Access Control Model
Role-based access control and role hierarchies have been the subject of considerable research in recent years. In this paper, we consider three useful applications of a new role-b...
Liang Chen, Jason Crampton
ECOOPW
1998
Springer
14 years 2 months ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea
ACSAC
2002
IEEE
14 years 3 months ago
A Model for Attribute-Based User-Role Assignment
The Role-Based Access Control (RBAC) model is traditionally used to manually assign users to appropriate roles, based on a specific enterprise policy, thereby authorizing them to ...
Mohammad A. Al-Kahtani, Ravi S. Sandhu
ARESEC
2011
145views more  ARESEC 2011»
12 years 11 months ago
An Attribute Based Framework for Risk-Adaptive Access Control Models
—The concept of risk-based adaptive access control (RAdAC, pronounced Raid-ack) has been recently introduced in the literature. It seeks to automatically (or semi-automatically) ...
Savith Kandala, Ravi S. Sandhu, Venkata Bhamidipat...