2004
DOI: 10.1007/978-3-540-30079-3_11
|View full text |Cite
|
Sign up to set email alerts
|

Role-Based Privilege Management Using Attribute Certificates and Delegation

Abstract: Abstract. The Internet provides tremendous connectivity and immense information sharing capability which the organizations can use for their competitive advantage. However, we still observe security challenges in Internet-based applications that demand a unified mechanism for both managing the authentication of users across enterprises and implementing business rules for determining user access to enterprise applications and their resources. These business rules are utilized for privilege management or authori… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0
1

Year Published

2005
2005
2011
2011

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 15 publications
(18 reference statements)
0
2
0
1
Order By: Relevance
“…Role-based access control (RBAC) is designed to simplify the allocation of access rights, by mapping users to roles and then mapping permissions to the roles [2, 32]. While computationally more tractable, the roles created in RBAC tend to be static.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Role-based access control (RBAC) is designed to simplify the allocation of access rights, by mapping users to roles and then mapping permissions to the roles [2, 32]. While computationally more tractable, the roles created in RBAC tend to be static.…”
Section: Related Workmentioning
confidence: 99%
“…However, less attention has been directed toward the detection of insider threats. While there are some technologies that have been developed to safeguard information from insiders, including the many variants of access control to prevent exposures [2, 7, 11] as well as behavior monitoring tools to discover exposures [23, 29, 30, 36, 38], these are insu cient for emerging CIS. In particular, there are several key limitations of existing insider threat detection and prevention models that we wish to highlight.…”
Section: Introductionmentioning
confidence: 99%
“…Με άλλα λόγια, οι αλλαγές που θα προκύψουν στην ιεραρχία µε την αφαίρεση ενός συνδέσµου δεν θα πρέπει να αλλάζουν τις περιοχές δικαιοδοσίας. µεταβίβαση αδειών πρόσβασης χαρακτηρίζεται ως ένας διαχειριστικός µηχανισµός που είναι αρκετά διαδεδοµένος στον τοµέα του ελέγχου προσπέλασης, διότι παρέχει τους κατάλληλους µηχανισµούς για τη µεταφορά εξουσίας (authority)[Ahn, Shin et al, 2004].Η υιοθέτησή του όµως σε βασισµένα-σε-ρόλους συστήµατα παρουσιάζει δυσκολίες και είναι ένα ιδιαίτερα επίπονο έργο, ιδιαίτερα όταν η µεταβίβαση πραγµατοποιείται µε σύνολα αδειών. Επιπλέον σε ορισµένες περιπτώσεις, η δυνατότητα αυτή, χρειάζεται να υπόκειται σε έναν κεντρικό διαχειριστικό έλεγχο προκειµένου να εξασφαλίζεται ότι η πολιτική του ελέγχου προσπέλασης δεν παρασύρεται µακριά από τους αρχικούς στόχους της.…”
unclassified