Adding Attributes to Role-Based Access Control

被引:206
|
作者
Kuhn, D. Richard [1 ]
Coyne, Edward J. [2 ]
Weil, Timothy R.
机构
[1] Natl Inst Stand & Technol, Gaithersburg, MD 20899 USA
[2] Sci Applicat Int Corp, Mclean, VA 22102 USA
关键词
Adding and managing attributes; Attribute based access control; Controlling permissions; Dynamic roles; Role-based access control;
D O I
10.1109/MC.2010.155
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Merging the best features of RBAC and attribute-based systems can provide effective access control for distributed and rapidly changing applications. © 2006 IEEE.
引用
收藏
页码:79 / 81
页数:3
相关论文
共 50 条
  • [1] Integrating Attributes into Role-Based Access Control
    Rajpoot, Qasim Mahmood
    Jensen, Christian Damsgaard
    Krishnan, Ram
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXIX, 2015, 9149 : 242 - 249
  • [2] Attributes Enhanced Role-Based Access Control Model
    Rajpoot, Qasim Mahmood
    Jensen, Christian Damsgaard
    Krishnan, Ram
    [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2015, 9264 : 3 - 17
  • [3] Automated and Efficient Analysis of Role-Based Access Control with Attributes
    Armando, Alessandro
    Ranise, Silvio
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 25 - 40
  • [4] Role-based access control
    [J]. Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [5] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [6] Role-Based Access Control and the Access Control Matrix
    Saunders, G.
    Hitchens, M.
    Varadharajan, V.
    [J]. 2001, Association for Computing Machinery (35):
  • [7] Role-based access control in DCOM
    Ahn, GJ
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
  • [8] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    [J]. COMPUTER, 2012, 45 (06) : 81 - 88
  • [9] Delegation in role-based access control
    Jason Crampton
    Hemanth Khambhammettu
    [J]. International Journal of Information Security, 2008, 7 : 123 - 136
  • [10] Practical Role-Based Access Control
    Galante, Victoria
    [J]. INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73