Proceedings of the First ACM Workshop on Role-Based Access Control - RBAC '95 1996
DOI: 10.1145/270152.270176
|View full text |Cite
|
Sign up to set email alerts
|

Role-based access control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0
2

Year Published

2002
2002
2011
2011

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(17 citation statements)
references
References 3 publications
0
15
0
2
Order By: Relevance
“…4 Early contributions focus on the identification of future research areas and developments while later articles commonly analyze the historical development of specific role-related research issues. The first metaanalyses identified the refinement and development of the nature of RBAC as well as the practical implementation of RBAC as major research areas (Ferraiolo and Kuhn, 1996;Giuri, 1996). A marketing survey of Smith et al (Smith, 1997;Smith et al, 1996) focused on customer requirements regarding their security needs for information processing systems.…”
Section: 2mentioning
confidence: 99%
“…4 Early contributions focus on the identification of future research areas and developments while later articles commonly analyze the historical development of specific role-related research issues. The first metaanalyses identified the refinement and development of the nature of RBAC as well as the practical implementation of RBAC as major research areas (Ferraiolo and Kuhn, 1996;Giuri, 1996). A marketing survey of Smith et al (Smith, 1997;Smith et al, 1996) focused on customer requirements regarding their security needs for information processing systems.…”
Section: 2mentioning
confidence: 99%
“…Several researchers have addressed issues related to inheritance semantics in RBAC [Giuri 1995], [Giuri 1996], [Moffett 1998], [Nyanchama and Osborn 1999], [Sandhu 1996], [Sandhu 1998]. Our earlier work has addressed issues concerning the inheritance relation when temporal properties are introduced [Joshi et al 2002].…”
Section: Related Workmentioning
confidence: 99%
“…Sandhu's notion of activation hierarchy extending the inheritance hierarchy corresponds to the IA-hierarchy and our A-hierarchy corresponds to Sandhu's relation that relates two roles by activation hierarchy but not by inheritance semantics [Sandhu 1998]. In [Giuri 1995], [Giuri 1996], Giuri has proposed an activation hierarchy based on AND and OR roles. However, these AND-OR roles can be easily simulated within Sandhu's ER-RBAC96 model that uses usage and activation hierarchies, making Giuri's model a special case of ER-RBAC96 [Sandhu 1998].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…As discussed in the introduction, most real-world RBAC systems now provide parameterisation; early examples include [1,9,10,12]. This trend has been further reinforced by the specific parameterised models present in the NIST RBAC standards [15].…”
Section: Related Workmentioning
confidence: 99%