Adding Attributes to Role-Based Access Control

被引:206
|
作者
Kuhn, D. Richard [1 ]
Coyne, Edward J. [2 ]
Weil, Timothy R.
机构
[1] Natl Inst Stand & Technol, Gaithersburg, MD 20899 USA
[2] Sci Applicat Int Corp, Mclean, VA 22102 USA
关键词
Adding and managing attributes; Attribute based access control; Controlling permissions; Dynamic roles; Role-based access control;
D O I
10.1109/MC.2010.155
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Merging the best features of RBAC and attribute-based systems can provide effective access control for distributed and rapidly changing applications. © 2006 IEEE.
引用
收藏
页码:79 / 81
页数:3
相关论文
共 50 条
  • [41] λ-RBAC:: Programming with role-based access control
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, 2006, 4052 : 456 - 467
  • [42] Mining constraints in role-based access control
    Ma, Xiaopu
    Li, Ruixuan
    Lu, Zhengding
    Wang, Wei
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 87 - 96
  • [43] A novel approach to role-based access control
    Chae, SH
    Kim, W
    Kim, DK
    [J]. COMPUTATIONAL SCIENCE - ICCS 2003, PT IV, PROCEEDINGS, 2003, 2660 : 1060 - 1068
  • [44] The implementation of role-based access control on the web
    Xu, CG
    Yan, H
    Liu, FG
    [J]. 2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : D251 - D255
  • [45] Garbled role-based access control in the cloud
    Alam, Masoom
    Emmanuel, Naina
    Khan, Tanveer
    Xiang, Yang
    Hassan, Houcine
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 1153 - 1166
  • [46] A Role-Based Workflow Access Control Model
    Zhang Wen-dong
    Zhang Kai-ji
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 1136 - 1139
  • [47] Spatial context in role-based access control
    Zhang, Hong
    He, Yeping
    Shi, Zhiguo
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2006, PROCEEDINGS, 2006, 4296 : 166 - 178
  • [48] Role-based access control for a distributed calculus
    Braghin, Chiara
    Gorla, Daniele
    Sassone, Vladimiro
    [J]. JOURNAL OF COMPUTER SECURITY, 2006, 14 (02) : 113 - 155
  • [49] A novel approach for role-based access control
    Yang Geng
    Rong Chunming
    Shen Jiangang
    Wang Jiangtao
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2007, 16 (01) : 1 - 6
  • [50] Context sensitivity in role-based access control
    Kumar, Arun
    Karnik, Neeran
    Chafle, Girish
    [J]. Operating Systems Review (ACM), 2002, 36 (03): : 53 - 66