2005
DOI: 10.1109/tkde.2005.185
|View full text |Cite
|
Sign up to set email alerts
|

Secure interoperation in a multidomain environment employing RBAC policies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
111
0
5

Year Published

2006
2006
2017
2017

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 192 publications
(124 citation statements)
references
References 22 publications
0
111
0
5
Order By: Relevance
“…The static mapping is a tightly coupled and global role mapping approach with a coordination center [7]. The static role mapping has advantages in large-scale distributed intra-domain policy synthesis, but in less highly interactive conditions.…”
Section: Real-time Access Control Policy Synthesismentioning
confidence: 99%
“…The static mapping is a tightly coupled and global role mapping approach with a coordination center [7]. The static role mapping has advantages in large-scale distributed intra-domain policy synthesis, but in less highly interactive conditions.…”
Section: Real-time Access Control Policy Synthesismentioning
confidence: 99%
“…Bertino et al [16] projected the temporal RBAC (TRBAC) model that allows and disallows a role at run time according to requests of users. In [17], in some applications, certain roles need to be constant and stay enabled all the time, while there only the users and permissions that are going to be assigned dynamically. Another generalized model is also projected called TRBAC model that look for activation of role instead of role enabling.…”
Section: Access Control Modules For Cloud 41 Role Based Access Contrmentioning
confidence: 99%
“…In [12], the authors argue that in some applications, certain roles need to be static and stay enabled all the time, while it is only the users and permissions that are dynamically assigned. In this context, they proposed a generalized TRBAC (GTRBAC) model that advocates for role activation instead of role enabling.…”
Section: Role-based Access Control Modelmentioning
confidence: 99%