1996
DOI: 10.1007/978-0-387-34932-9_9
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Mandatory Access Control in Role-Based Security Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

1996
1996
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(20 citation statements)
references
References 11 publications
0
20
0
Order By: Relevance
“…Nyanchama and Osborn [6] presented a way to model mandatory access control in RBAC systems. Nyanchama and Osborn argued that this could benefit from the flexible permission allocation management provided by RBAC models as well as the powerful modeling capability of RBAC models.…”
Section: Related Workmentioning
confidence: 99%
“…Nyanchama and Osborn [6] presented a way to model mandatory access control in RBAC systems. Nyanchama and Osborn argued that this could benefit from the flexible permission allocation management provided by RBAC models as well as the powerful modeling capability of RBAC models.…”
Section: Related Workmentioning
confidence: 99%
“…There have been several attempts to implement BLP models using role-based models [13,14,15,16]. Osborn et al's approach [13,14,15] shows how the role-graph model can be configured to enforce information flow policies.…”
Section: Related Workmentioning
confidence: 99%
“…Osborn et al's approach [13,14,15] shows how the role-graph model can be configured to enforce information flow policies. In their approach the lattice of security label is defined separately and independently from the role graph.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Separation of duties can be achieved by defining mutually exclusive roles, which have to be invoked for a collaborative task, in order to ensure that a sequence of tasks cannot be carried out by a single individual. Furthermore, RBAC can coexist with, or be used to support, mandatory access control policy [13] such as BLP or a discretionary access control policy [16], where users are assigned permissions individually. There is quite a significant variation in the interpretation of RBAC, differing in the level of sophistication that different models support.…”
Section: Access Policiesmentioning
confidence: 99%