Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186)
DOI: 10.1109/secpri.1998.674833
|View full text |Cite
|
Sign up to set email alerts
|

On the formal definition of separation-of-duty policies and their composition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
130
0
5

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 158 publications
(135 citation statements)
references
References 6 publications
0
130
0
5
Order By: Relevance
“…Authorization constraints may need to be imposed on the RBAC functions and relations in order to prevent the information misuse and fraudulent activities. In the literature, several kinds of authorization constraints have been identified such as various types of static and dynamic SOD constraints [7,8,9]; constraints on delegation [10]; cardinality constraints [3]; context constraints [10,11].…”
Section: Rbac and Authorization Constraintsmentioning
confidence: 99%
See 1 more Smart Citation
“…Authorization constraints may need to be imposed on the RBAC functions and relations in order to prevent the information misuse and fraudulent activities. In the literature, several kinds of authorization constraints have been identified such as various types of static and dynamic SOD constraints [7,8,9]; constraints on delegation [10]; cardinality constraints [3]; context constraints [10,11].…”
Section: Rbac and Authorization Constraintsmentioning
confidence: 99%
“…Specifically, advanced RBAC concepts like role-based authorization constraints are a powerful means for laying out higher-level organizational rules [7]. Hence, we define an RBAC policy as hierarchical RBAC in the sense of the RBAC standard [14] plus a set of organizational rules where each rule corresponds to a rolebased authorization constraint, such as separation of duty (SOD) constraints [7,8,9], cardinality constraints [3], and context constraints [10,11].…”
Section: Introductionmentioning
confidence: 99%
“…However, due to the fact that we consider here only one snapshot of the system, we have no notion of time. Hence, authorisation constraints that consider the execution history such as history-based or object-based dynamic SoD [10] cannot be adequately expressed.…”
Section: History-based Constraintsmentioning
confidence: 99%
“…Dynamic object-based SoD roughly speaking means that a user must not act upon an object that the same user has previously acted upon. Other dynamic SoD constraints enumerated in [10] can clearly be expressed in TOCL, too.…”
Section: History-based Constraintsmentioning
confidence: 99%
“…Role-based access control (RBAC) is a flexible and policy-neutral access control technology and is a promising access control technology for the modern computing environment [1,3,6,16]. In RBAC, permissions(each permission is a pair of objects and operations) are associated with roles and users are assigned to appropriate roles thereby acquiring the roles' permissions.…”
Section: Introductionmentioning
confidence: 99%