Migrating to role-based access control

被引:8
|
作者
Brooks, K [1 ]
机构
[1] AverStar Inc, Greenbelt, MD 20770 USA
关键词
Role-Based Access Control; migration; enterprise systems management; Tivoli Management Environment; security management;
D O I
10.1145/319171.319178
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This project seeks to provide a single, GUI based security management interface for an existing, highly complex information systems environment. Among the identified requirements and goals for this project are, the use of Commercial Off-the-Shelf software, and the implementation of a foundation for an RBAC based approach to security management. This paper presents an overview of the RBAC salient issues that have been surfaced by initial efforts. This paper also highlights some of challenges faced in migration from an existing environment that has been developed over time and is largely segmented in both user communities and support groups to a centralized RBAC environment.
引用
收藏
页码:71 / 81
页数:11
相关论文
共 50 条
  • [1] Role-based access control
    [J]. Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [2] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [3] Role-Based Access Control and the Access Control Matrix
    Saunders, G.
    Hitchens, M.
    Varadharajan, V.
    [J]. 2001, Association for Computing Machinery (35):
  • [4] Role-based access control in DCOM
    Ahn, GJ
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
  • [5] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    [J]. COMPUTER, 2012, 45 (06) : 81 - 88
  • [6] Delegation in role-based access control
    Jason Crampton
    Hemanth Khambhammettu
    [J]. International Journal of Information Security, 2008, 7 : 123 - 136
  • [7] Practical Role-Based Access Control
    Galante, Victoria
    [J]. INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73
  • [8] Role delegation in role-based access control
    Na, SangYeob
    Cheon, SuhHyun
    [J]. Proceedings of the ACM Workshop on Role-Based Access Control, 2000, : 39 - 44
  • [9] Role-based access control in JavaTM
    Fondazione Ugo Bordoni, Roma, Italy
    [J]. Proceedings of the ACM Workshop on Role-Based Access Control, 1998, : 91 - 100
  • [10] Generalized Role-Based Access Control
    Moyer, MJ
    Ahamad, M
    [J]. 21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2001, : 391 - 398