36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of The 2003
DOI: 10.1109/hicss.2003.1174463
|View full text |Cite
|
Sign up to set email alerts
|

Supporting parameterised roles with object-based access control

Abstract: The per-method access control lists of standard internet technologies allow only simple forms of access control to be expressed and enforced. They also fail to enforce a strict need-to-know view of persistent data. Real applications require more flexible security constraints including parameter restrictions, logging of accesses and state-dependent access constraints. In particular, the concept of parameterised roles, central to a fine-grained specification of access rules and compliance with privacy laws, shou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2012
2012
2012
2012

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…[15] defines parameterized privileges to restrict access to a subset of objects. Similar literature such as parameterized role [3,10,14], object sensitive role [12] and attributed role [27] are also proposed. RB-RBAC model [4] use attributes to assist automatic user-role assignment.…”
Section: Related Workmentioning
confidence: 99%
“…[15] defines parameterized privileges to restrict access to a subset of objects. Similar literature such as parameterized role [3,10,14], object sensitive role [12] and attributed role [27] are also proposed. RB-RBAC model [4] use attributes to assist automatic user-role assignment.…”
Section: Related Workmentioning
confidence: 99%