2009 Annual Computer Security Applications Conference 2009
DOI: 10.1109/acsac.2009.11
|View full text |Cite
|
Sign up to set email alerts
|

RoleVAT: Visual Assessment of Practical Need for Role Based Access Control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0
2

Year Published

2010
2010
2020
2020

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(12 citation statements)
references
References 20 publications
0
10
0
2
Order By: Relevance
“…Our sources for these can be classified into three. (1) top-down design of RBAC policies [3,15,16,17], (2) role mining and engineering [18,19,20,21,22,23,24,25], and, (3) evaluation of approaches to access-enforcement [4,5,8]. We also have created some new kinds of policies based on policies from the literature.…”
Section: Rbac Policiesmentioning
confidence: 99%
“…Our sources for these can be classified into three. (1) top-down design of RBAC policies [3,15,16,17], (2) role mining and engineering [18,19,20,21,22,23,24,25], and, (3) evaluation of approaches to access-enforcement [4,5,8]. We also have created some new kinds of policies based on policies from the literature.…”
Section: Rbac Policiesmentioning
confidence: 99%
“…If a small δ is allowed, k can be considerably smaller than the Boolean rank. For an estimate of k in O(|U SER| 2 )-time, based on visual inspection, one could, for instance, employ the method proposed in [31].…”
Section: Discussionmentioning
confidence: 99%
“…We are aware that the visualization of large-scale RBAC models might result into very large and complex images. In this case, a section of the RBAC model (e.g., visualize only a set of roles and their assignments) can reduce the complexity for illustration purposes or other visualizations might be more applicable (e.g., [28,3]). …”
Section: Methodsmentioning
confidence: 98%