Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Ful
DOI: 10.1109/hicss.1999.773053
|View full text |Cite
|
Sign up to set email alerts
|

An object-oriented organizational model to support dynamic role-based access control in electronic commerce applications

Abstract: Role-based access control (RBAC) provides flexibility to security management over the traditional approach of using user and group identifiers. In RBAC, access privileges are given to roles rather than to individual users. Users acquire the corresponding permissions when playing different roles. Roles can be defined simply as a label, but such an approach lacks the support to allow users to automatically change roles under different contexts; this static method also adds administrative overheads in role assign… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…The identification and authority component includes verification and authentication techniques associated with verifying users' identities and access rights (Budiarto and Masahiko 2002;Joshi et al 2001;Priem and Butler 2001). The data access control component consists of access control tools and equipment to control information access (Cheng 1999;Ferraiolo et al 2001;Gunter 2000;Zhang and Yang 2003), while the data encryption and decryption component consists of technology that functions to protect sensitive information from unauthorized access (Joshi et al 2001;Twitchell 2004;Velissarios and Santarossa 1999). The data storage and backup component includes backup devices that keep information accessible during system failures or data impairment (Twitchell 2004;Schultz et al 2001;Weill et al 2002).…”
Section: Is Security Infrastructure Resourcesmentioning
confidence: 99%
“…The identification and authority component includes verification and authentication techniques associated with verifying users' identities and access rights (Budiarto and Masahiko 2002;Joshi et al 2001;Priem and Butler 2001). The data access control component consists of access control tools and equipment to control information access (Cheng 1999;Ferraiolo et al 2001;Gunter 2000;Zhang and Yang 2003), while the data encryption and decryption component consists of technology that functions to protect sensitive information from unauthorized access (Joshi et al 2001;Twitchell 2004;Velissarios and Santarossa 1999). The data storage and backup component includes backup devices that keep information accessible during system failures or data impairment (Twitchell 2004;Schultz et al 2001;Weill et al 2002).…”
Section: Is Security Infrastructure Resourcesmentioning
confidence: 99%
“…In [7] an object-oriented organizational model, OMM, is presented as an underlying model to support dynamic role definition. In [8] an organization and resource model is presented.…”
Section: Introductionmentioning
confidence: 99%
“…More precisely, if a given permission is granted to a given role, then all users that play this role will inherit the given permission. Therefore, it is not possible to specify that a physician is permitted to have a direct access to the patient records, unless he/she is one of the physician's patient [12,13]. Moreover, as mentioned in the previous section, another limit of the RBAC model is that it only enables the administrator to specify permissions.…”
Section: Role Based Access Controlmentioning
confidence: 99%