2003
DOI: 10.1007/978-3-540-39671-0_16
|View full text |Cite
|
Sign up to set email alerts
|

A Policy-Based Framework for RBAC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2004
2004
2016
2016

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…Approaches like UMLSec [16] and SecureUML [22] offer the possibility of modeling (role-based) access-control policies but they do not directly support their execution. Close to our work by using MDE techniques for providing PDPs, in [25] the authors provide a PDP/PEP implementation for RBAC based in the PCIM standard whereas in [11] the authors use Security@runtime to implement a PDP (the PDP itself being implemented in Prolog) that supports runtime changes in the access-control policy. Milhau et al combine secureUML and B-method to obtain verifiable access-control PDP.…”
Section: Related Workmentioning
confidence: 99%
“…Approaches like UMLSec [16] and SecureUML [22] offer the possibility of modeling (role-based) access-control policies but they do not directly support their execution. Close to our work by using MDE techniques for providing PDPs, in [25] the authors provide a PDP/PEP implementation for RBAC based in the PCIM standard whereas in [11] the authors use Security@runtime to implement a PDP (the PDP itself being implemented in Prolog) that supports runtime changes in the access-control policy. Milhau et al combine secureUML and B-method to obtain verifiable access-control PDP.…”
Section: Related Workmentioning
confidence: 99%
“…There are many details concerning how conditions are grouped and evaluated. For a more detailed discussion about extending PCIM model, please, refer to [14].…”
Section: Business Level Qos Policy Modelmentioning
confidence: 99%
“…In our current implementation, the server application communicates with the RBAC framework through a set of RBAC-based API, which follows the definitions proposed by the NIST standard [1]. These API are described in details in [12]. In the second approach (B) the information in the RBAC-PIB is translated to configuration commands to the underlying system or to network devices via SNMPv3 or CLICommand Line Interface.…”
Section: Related Workmentioning
confidence: 99%
“…The RBPIM is based on a previous work described in [12]. In [12], however, the RBPIM model has been explored using the outsourcing approach.…”
Section: Contributionsmentioning
confidence: 99%
See 1 more Smart Citation