Tower: A language for role based access control

被引:0
|
作者
Hitchens, M [1 ]
Varadharajan, V [1 ]
机构
[1] Univ Western Sydney Nepean, Sch Comp & Informat Technol, Distributed Syst & Network Secur Res Grp, Nepean, NSW, Australia
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A language for specifying role-based access control (RBAC) policies is presented. The language is designed to support the range of access control policies of commercial object systems. The basic structures of RBAC, such as role, users and permission, are present in the language as basic constructs. Examples are given in the language of access control situations, such as static and dynamic separation of duty, delegation and joint action based access policies. The language is flexible and is able to capture meta-level operations. The language also provides a mechanism for tracking actions and basing access control decisions on past events.
引用
收藏
页码:88 / 106
页数:19
相关论文
共 50 条
  • [1] Issues in the design of a language for role based access control
    Hitchens, M
    Varadharajan, V
    [J]. INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 1999, 1726 : 22 - 38
  • [2] Elements of a language for role-based access control
    Hitchens, M
    Varadharajan, V
    [J]. INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 371 - 380
  • [3] CONTROL TOWER LANGUAGE
    FRICK, FC
    SUMBY, WH
    [J]. JOURNAL OF THE ACOUSTICAL SOCIETY OF AMERICA, 1952, 24 (06): : 595 - 596
  • [4] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [5] Redaction based RDF Access Control Language
    Rachapalli, Jyothsna
    Khadilkar, Vaibhav
    Kantarcioglu, Murat
    Thuraisingham, Bhavani
    [J]. PROCEEDINGS OF THE 19TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'14), 2014, : 177 - 180
  • [6] Supporting relationships in access control using role based access control
    Barkley, J
    Beznosov, K
    Uppal, J
    [J]. FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 55 - 65
  • [7] Improved role based access control
    Engineering and Research Center for Information Security Technology, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    不详
    [J]. Jisuanji Gongcheng, 2006, 7 (140-142+168):
  • [8] Role based access control models
    Sandhu, RS
    Coyne, EJ
    Feinstein, HL
    Youman, CE
    [J]. COMPUTER, 1996, 29 (02) : 38 - &
  • [9] An application of directory service markup language (DSML) for role-based access control (RBAC)
    Shin, DW
    Ahn, GJ
    Park, JS
    [J]. 26TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 934 - 939
  • [10] Role activation management in role based access control
    Lui, RWC
    Chow, SSM
    Hui, LCK
    Yiu, SM
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2005, 3574 : 358 - 369