Proceedings of the Third ACM Workshop on Role-Based Access Control 1998
DOI: 10.1145/286884.286901
|View full text |Cite
|
Sign up to set email alerts
|

Managing role/permission relationships using object access types

Abstract: The role metaphor in Role Based Access Control (RBAC) is particularly powerful in its ability to express access policy in terms of the way in which administrators view organizations.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

1999
1999
2014
2014

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 2 publications
0
7
0
Order By: Relevance
“…We can see in figure 1.b, the kernel security layer in trusted operating system may comprise DAC, MAC, Least Privilege, auditing, or any more number of extra security features [5] [10]. features as we are using the trusted operating system for the same.…”
Section: Architecturementioning
confidence: 99%
“…We can see in figure 1.b, the kernel security layer in trusted operating system may comprise DAC, MAC, Least Privilege, auditing, or any more number of extra security features [5] [10]. features as we are using the trusted operating system for the same.…”
Section: Architecturementioning
confidence: 99%
“…The task is particularly difficult in that neither documentation nor source code for Windows NT session establishment is public information. Because RBAC/Web for Windows NT only implements [Barkley and Cincotta 1998], was implemented to manage role/permission relationships in the Windows NT environment.…”
Section: Rbac/web For Windows Ntmentioning
confidence: 99%
“…Barkley and Cincotta [9] have addressed this problem by developing a tool for administering the association between roles and permissions using the concept of objects that encapsulate transactions and the data used by these transactions. Their tool allows management of the association of objects with roles.…”
Section: Role-target Associationsmentioning
confidence: 99%
“…However as pointed out by Barkley and Cincotta [9] in their discussion of managing role-permission relationships using object access types, the literature on rolepermission relationships is still sparse. Our own research (discussed in the following section) on the working of large-scale financial institutions had made us conscious of the context sensitivity of the access privileges in such enterprises.…”
Section: Introductionmentioning
confidence: 99%