Proceedings of the Fifth ACM Workshop on Role-Based Access Control 2000
DOI: 10.1145/344287.344301
|View full text |Cite
|
Sign up to set email alerts
|

The NIST model for role-based access control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
392
0
16

Year Published

2002
2002
2023
2023

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 695 publications
(409 citation statements)
references
References 15 publications
1
392
0
16
Order By: Relevance
“…XACML [13] is an OASIS standard for the specification of access-control policies in XML and is ABAC [23] and RBAC [20] (two of the most successful access-control models) capable. Its flexibility to represent multiple policies for the same system and the fact of counting with a reference implementation, along Fig.…”
Section: Application Scenariosmentioning
confidence: 99%
“…XACML [13] is an OASIS standard for the specification of access-control policies in XML and is ABAC [23] and RBAC [20] (two of the most successful access-control models) capable. Its flexibility to represent multiple policies for the same system and the fact of counting with a reference implementation, along Fig.…”
Section: Application Scenariosmentioning
confidence: 99%
“…From the insider threat perspective, data harvesting and masquerading can both result in this type of anomaly. As an example, consider the following two queries to the database described in Table 1 Distinguishing these kinds of queries has received the most attention in the literature (e.g., [14]) especially in the context of masquerade detection and Role Based Access Control (RBAC) [26], where different user roles are associated with different authorizations and privilege levels. An attempt by one user-role to execute a query associated with another role indicates anomalous behavior and a possible attempt at masquerade.…”
Section: A Data-centric Taxonomy Of Query Anomaliesmentioning
confidence: 99%
“…The authors illustrate this by presenting a family of models with varying levels of complexity. More recently, Sandhu et al [15] have proposed the NIST RBAC model, which is an attempt to define a unified standard. The NIST RBAC model is actually a sequence of models, with each subsequent model containing an increased set of capabilities.…”
Section: Access Policiesmentioning
confidence: 99%