How role based access control is implemented in SESAME

被引:4
|
作者
Vandenwauver, M
Govaerts, R
Vandewalle, J
机构
关键词
D O I
10.1109/ENABL.1997.630828
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we want to share our experiences with implementing a scheme that enforces role based access control in a distributed, heterogeneous computing environment. This work was done in the framework of the EC-RACE project SESAME (A Secure European System in A Multi-vendor Environment). The SESAME project relies on the work done by ECMA (European Computer Manufacturers Association) to represent the credentials of the users and fully supports the GSS-API to help the application developers. We conclude that enforcing such a scheme is realistic and that writing applications, that benefit from the advantages of role based access control, is very feasible. We have built several demonstration applications.
引用
收藏
页码:293 / 298
页数:6
相关论文
共 50 条
  • [1] An Efficient Role and Object Based Access Control Model Implemented in a PDM System
    HUANG Xiaowen TAN Jian HUANG Xiangguo School of Mechantronic EngineeringWuhan University of TechnologyWuhan China
    武汉理工大学学报, 2006, (S3) : 788 - 791
  • [2] An efficient role and object based access control model implemented in a PDM system
    Huang Xiaowen
    Tan Jian
    Huang Xiangguo
    1st International Symposium on Digital Manufacture, Vols 1-3, 2006, : 788 - 791
  • [3] Role-Based Access Control Mechanisms Distributed, Statically Implemented and Driven by CRUD Expressions
    Pereira, Oscar Mortagua
    Regateiro, Diogo Domingues
    Aguiar, Rui L.
    2014 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2014,
  • [4] Role-Based Access Control and the Access Control Matrix
    Saunders, G.
    Hitchens, M.
    Varadharajan, V.
    2001, Association for Computing Machinery (35):
  • [5] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [6] How was the UNAIDS drug access initiative implemented in Chile?
    Brousselle, A
    Champagne, F
    EVALUATION AND PROGRAM PLANNING, 2004, 27 (03) : 295 - 308
  • [7] Supporting relationships in access control using role based access control
    Barkley, J
    Beznosov, K
    Uppal, J
    FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 55 - 65
  • [8] Improved role based access control
    Engineering and Research Center for Information Security Technology, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    不详
    Jisuanji Gongcheng, 2006, 7 (140-142+168):
  • [9] Role-based access control
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [10] Role based access control models
    Sandhu, RS
    Coyne, EJ
    Feinstein, HL
    Youman, CE
    COMPUTER, 1996, 29 (02) : 38 - &