Proceedings of the Second ACM Workshop on Role-Based Access Control - RBAC '97 1997
DOI: 10.1145/266741.266773
|View full text |Cite
|
Sign up to set email alerts
|

Role templates for content-based access control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
64
0
2

Year Published

2001
2001
2015
2015

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 122 publications
(66 citation statements)
references
References 5 publications
0
64
0
2
Order By: Relevance
“…The main difference between this work and these four is our focus on attributebased tree-structured policy templates supported by a concrete policy language, the generalization of policy templates into policy modules and the validation of the potential of policy templates. In addition to these authors, templates have also been discussed in the evolution from role-based access control (RBAC, [7]) to ABAC (e.g., [9,13]). Such role templates were eventually generalized into attribute-based policies, for which STAPL in turn introduces policy templates.…”
Section: Related Work and Discussionmentioning
confidence: 99%
“…The main difference between this work and these four is our focus on attributebased tree-structured policy templates supported by a concrete policy language, the generalization of policy templates into policy modules and the validation of the potential of policy templates. In addition to these authors, templates have also been discussed in the evolution from role-based access control (RBAC, [7]) to ABAC (e.g., [9,13]). Such role templates were eventually generalized into attribute-based policies, for which STAPL in turn introduces policy templates.…”
Section: Related Work and Discussionmentioning
confidence: 99%
“…The database community has also addressed the enforcement of instance-level access control policies (e.g., [12,26,20,22]). In particular, [12] extends RBAC with parameterized role templates, where the parameters of a template refer to database columns or constants and serve a similar function as our role parameters.…”
Section: Related Workmentioning
confidence: 99%
“…In particular, [12] extends RBAC with parameterized role templates, where the parameters of a template refer to database columns or constants and serve a similar function as our role parameters. Implementing fine-grained access control policies at the database level has two key advantages: one can define policies directly on the data to be protected and the filtering of records can be integrated with query optimization.…”
Section: Related Workmentioning
confidence: 99%
“…Since then there are many extended proposals for modeling fine-grained access control. We have role-templates [10], domain-type enforcement [2], content-based [20], team-based [9], and instance-level [11], just to name a few. Basically, they all attempt to base access control constraints on some more detailed relationships among the user, the function requested, and the data to be accessed, as we did here.…”
Section: Related Workmentioning
confidence: 99%