Adding Attributes to Role-Based Access Control

被引:206
|
作者
Kuhn, D. Richard [1 ]
Coyne, Edward J. [2 ]
Weil, Timothy R.
机构
[1] Natl Inst Stand & Technol, Gaithersburg, MD 20899 USA
[2] Sci Applicat Int Corp, Mclean, VA 22102 USA
关键词
Adding and managing attributes; Attribute based access control; Controlling permissions; Dynamic roles; Role-based access control;
D O I
10.1109/MC.2010.155
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Merging the best features of RBAC and attribute-based systems can provide effective access control for distributed and rapidly changing applications. © 2006 IEEE.
引用
收藏
页码:79 / 81
页数:3
相关论文
共 50 条
  • [31] Hierarchical role-based access control development
    Kolegov, D. N.
    [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2012, 17 (03): : 70 - 76
  • [32] Modal logic for role-based access control
    Kosiyatrakul, T
    Older, S
    Chin, SK
    [J]. COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 179 - 193
  • [33] Role-based access control model for GIS
    Pan, Yuqing
    Sheng, Yehua
    Zhou, Jieyu
    [J]. GEOINFORMATICS 2007: GEOSPATIAL INFORMATION TECHNOLOGY AND APPLICATIONS, PTS 1 AND 2, 2007, 6754
  • [34] Role-based access control for web services
    College of Information Sciences and Technology, Donghua University, 1882 Yan'an Road , Shanghai 200051, China
    [J]. WSEAS Trans. Inf. Sci. Appl., 2006, 8 (1553-1558):
  • [35] λ-RBAC: PROGRAMMING WITH ROLE-BASED ACCESS CONTROL
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    [J]. LOGICAL METHODS IN COMPUTER SCIENCE, 2008, 4 (01)
  • [36] Role-Based Access Control Models for Android
    Talegaon, Samir
    Krishnan, Ram
    [J]. 2020 SECOND IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2020), 2020, : 179 - 188
  • [37] Concurrency and Time in Role-Based Access Control
    Chiang, Chia-Chu
    Bayrak, Coskun
    [J]. ADVANCES IN INFORMATION SECURITY AND ITS APPLICATION, 2009, 36 : 37 - 42
  • [38] Static Enforcement of Role-Based Access Control
    Ali, Asad
    Fernandez, Maribel
    [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2014, (163): : 36 - 50
  • [39] Role-Based Access Control Modeling and Validation
    Haraty, Ramzi A.
    Naous, Mirna
    [J]. 2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
  • [40] Cryptographic Role-Based Access Control, Reconsidered
    Liu, Bin
    Michalas, Antonis
    Warinschi, Bogdan
    [J]. PROVABLE AND PRACTICAL SECURITY, PROVSEC 2022, 2022, 13600 : 282 - 289