2009
DOI: 10.1080/19393550903249612
|View full text |Cite
|
Sign up to set email alerts
|

Parameterized Role-Based Access Control Policies for XML Documents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…MAC features make it suitable for high security systems, but the lack of flexibility. In recent years hotspot of access control technology research focused on role-based access control (RBAC) which is proposed by Ferraiolo and Kuhn [5] and task-based access controls (TBAC) which is proposed by Kuhn [6]- [8], but there are also some other related research, such as dynamic role-based access control model [9], a suitable administrative model that governs changes to temporal policies [10], parameterized role-based access control [11], a framework using Budget-Aware Role Based Access Control (BARBAC) [12], adding time features [13] [14] or joining the task access control [15] [16] and so on.…”
Section: Background and Related Workmentioning
confidence: 99%
“…MAC features make it suitable for high security systems, but the lack of flexibility. In recent years hotspot of access control technology research focused on role-based access control (RBAC) which is proposed by Ferraiolo and Kuhn [5] and task-based access controls (TBAC) which is proposed by Kuhn [6]- [8], but there are also some other related research, such as dynamic role-based access control model [9], a suitable administrative model that governs changes to temporal policies [10], parameterized role-based access control [11], a framework using Budget-Aware Role Based Access Control (BARBAC) [12], adding time features [13] [14] or joining the task access control [15] [16] and so on.…”
Section: Background and Related Workmentioning
confidence: 99%
“…The work of (Müldner et al, 2009) presents an approach of supporting RBAC to handle the special case of role proliferation, which is an administrative issue that happens in RBAC when roles are changed, added, and evolve over time, making security of an organization difficult to manage. This approach supports the encryption of segments of the XML document.…”
Section: Related Workmentioning
confidence: 99%
“…Role-based access plays a significant part in tracking user activity (Qiu, Fuh, and Wong 2006;Müldner, Leighton, and Miziołek 2009;Masood et al 2009;Bouna, Chbeir, and Marrara 2009). Further investigation has indicated that PDM helps design engineers to manage product data and the product development process, and enterprise resource planning (ERP) is important in managing orders, production and inventory processes.…”
Section: Introductionmentioning
confidence: 98%