Proceedings of the 14th ACM Symposium on Access Control Models and Technologies 2009
DOI: 10.1145/1542207.1542223
|View full text |Cite
|
Sign up to set email alerts
|

A formal framework to elicit roles with business meaning in RBAC systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
43
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 45 publications
(43 citation statements)
references
References 24 publications
0
43
0
Order By: Relevance
“…The main benefit of adopting such a model is a simplification of the security policy definition task by business users who have no knowledge of IT systems. Further, use of roles minimizes system administration effort due to the reduced number of relationships required to relate users to permissions [4].…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…The main benefit of adopting such a model is a simplification of the security policy definition task by business users who have no knowledge of IT systems. Further, use of roles minimizes system administration effort due to the reduced number of relationships required to relate users to permissions [4].…”
Section: Introductionmentioning
confidence: 99%
“…However, the slavish application of standard data mining approaches to role engineering might yield roles that are merely a set of permissions, namely with no connection to the business practices. Indeed, organizations are unwilling to deploy roles they cannot bind to a business meaning [4]. For this reason, bottom-up should be used in conjunction with top-down, leading to an hybrid approach.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations