Role-Based Access Control in Retrospect

被引:8
|
作者
Franqueira, Virginia N. L.
Wieringa, Roel J. [1 ,2 ]
机构
[1] Univ Twente, Informat Syst Grp, Enschede, Netherlands
[2] Univ Twente, Dept Comp Sci, Enschede, Netherlands
关键词
D O I
10.1109/MC.2012.38
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A review of the state of the art of role-based access control can help practitioners assess RBAC's applicability to their organization and indicates where more research is needed to improve the RBAC model.
引用
收藏
页码:81 / 88
页数:8
相关论文
共 50 条
  • [1] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [2] Role-based access control in DCOM
    Ahn, GJ
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
  • [3] Delegation in role-based access control
    Jason Crampton
    Hemanth Khambhammettu
    [J]. International Journal of Information Security, 2008, 7 : 123 - 136
  • [4] Practical Role-Based Access Control
    Galante, Victoria
    [J]. INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73
  • [5] Generalized Role-Based Access Control
    Moyer, MJ
    Ahamad, M
    [J]. 21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2001, : 391 - 398
  • [6] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (02) : 123 - 136
  • [7] Fuzzy Role-Based Access Control
    Martinez-Garcia, Carles
    Navarro-Arribas, Guillermo
    Borrell, Joan
    [J]. INFORMATION PROCESSING LETTERS, 2011, 111 (10) : 483 - 487
  • [8] Migrating to role-based access control
    Brooks, K
    [J]. FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 71 - 81
  • [9] Study of Role-based Access Control
    Cao Yonghui
    [J]. EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5209 - 5212
  • [10] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    [J]. COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +