Adding Attributes to Role-Based Access Control

被引:206
|
作者
Kuhn, D. Richard [1 ]
Coyne, Edward J. [2 ]
Weil, Timothy R.
机构
[1] Natl Inst Stand & Technol, Gaithersburg, MD 20899 USA
[2] Sci Applicat Int Corp, Mclean, VA 22102 USA
关键词
Adding and managing attributes; Attribute based access control; Controlling permissions; Dynamic roles; Role-based access control;
D O I
10.1109/MC.2010.155
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Merging the best features of RBAC and attribute-based systems can provide effective access control for distributed and rapidly changing applications. © 2006 IEEE.
引用
收藏
页码:79 / 81
页数:3
相关论文
共 50 条
  • [21] On the homonymous role in role-based discretionary access control
    Ouyang, Kai
    Chu, Xiaowen
    Jiang, Yixin
    Chen, Hsiao-Hwa
    Liu, Jiangchuan
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 313 - +
  • [22] Extending a Role Graph for Role-Based Access Control
    Asakura, Yoshiharu
    Nakamoto, Yukikazu
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (02): : 211 - 219
  • [23] Rights management for role-based access control
    Bouwman, Bart
    Mauw, Sjouke
    Petkovic, Milan
    [J]. 2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 1085 - +
  • [24] Role-based access control for boxed ambients
    Compagnoni, Adriana
    Gunter, Elsa L.
    Bidinger, Philippe
    [J]. THEORETICAL COMPUTER SCIENCE, 2008, 398 (1-3) : 203 - 216
  • [25] Role-based access control in TOBIAS and NESS
    Marshall, LF
    [J]. IEE PROCEEDINGS-SOFTWARE, 2006, 153 (01): : 4 - 6
  • [26] Role-based access control consistency validation
    Centonze, Paolina
    Naumovich, Gleb
    Fink, Stephen J.
    Pistoia, Marco
    [J]. Proc. Int. Symp. Softw. Test. Anal. ISSTA, (121-131):
  • [27] Cryptographic Enforcement of Role-Based Access Control
    Crampton, Jason
    [J]. FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 191 - 205
  • [28] Elements of a language for role-based access control
    Hitchens, M
    Varadharajan, V
    [J]. INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 371 - 380
  • [29] Garbled role-based access control in the cloud
    Masoom Alam
    Naina Emmanuel
    Tanveer Khan
    Yang Xiang
    Houcine Hassan
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 1153 - 1166
  • [30] Resource hierarchies for role-based access control
    Wolf, A
    Von Hammel-Bonten, C
    Köhlmann, M
    Würfel, U
    [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VI, PROCEEDINGS: INDUSTRIAL SYSTEMS AND ENGINEERING I, 2002, : 195 - 200