Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies 2001
DOI: 10.1145/373256.373257
|View full text |Cite
|
Sign up to set email alerts
|

The role-based access control system of a European bank

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
65
0
1

Year Published

2006
2006
2014
2014

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 119 publications
(67 citation statements)
references
References 13 publications
1
65
0
1
Order By: Relevance
“…Furthermore, according to the case study report in [8], for a practical role system, m is much smaller than n 2 , i.e. m << n 2 , with n < N, thus we can get:…”
Section: Theoremmentioning
confidence: 96%
“…Furthermore, according to the case study report in [8], for a practical role system, m is much smaller than n 2 , i.e. m << n 2 , with n < N, thus we can get:…”
Section: Theoremmentioning
confidence: 96%
“…RBAC control method, exploit the association between users and permissions through the assignment of user's roles. Users can be assigned to roles, having associated permissions and thus, users acquire permissions by having roles [9], [10].…”
Section: Introductionmentioning
confidence: 99%
“…The large set of the cross-domain access control policies makes the management a complicated task [1]. The policy information visualization [2] technology can express the logical relation of the complex information intuitively which can effectively improve the management ability of the multidomain policy integration.…”
Section: Introductionmentioning
confidence: 99%