메뉴 건너뛰기




Volumn , Issue , 2009, Pages 23-31

How to securely break into RBAC: The BTG-RBAC model

Author keywords

Access control model; Break The Glass; NIST core RBAC; Obligations

Indexed keywords

ACCESS CONTROL DECISIONS; ACCESS CONTROL MODEL; ACCESS CONTROL MODELS; APPLICATION CODES; AUTHORIZATION INFRASTRUCTURE; AUTHORIZED USERS; DECISION ENGINES; EMERGENCY SITUATION; GENETIC INFORMATION; HEALTH CARE PROFESSIONALS; HEALTHCARE INSTITUTIONS; RBAC MODEL; RIGID MODEL; ROLE-BASED ACCESS CONTROL MODEL;

EID: 77649181757     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2009.12     Document Type: Conference Paper
Times cited : (92)

References (21)
  • 2
    • 30644462262 scopus 로고    scopus 로고
    • ANSI/INCITS 359-2004. International Committee for Information Technology Standards.
    • Information Technology - Role Based Access Control. ANSI/INCITS 359-2004. International Committee for Information Technology Standards.
    • Information Technology - Role Based Access Control
  • 9
    • 77950835207 scopus 로고    scopus 로고
    • Accessed at: Accessed on the 5th May 2009
    • 7869 2008-A SCR Clinical User Guide. NHS care records service - NHS Connecting for Health. 2008. Accessed at: http://www.connectingforhealth.nhs.uk/ systemsandservices /nhscrs/scr/publications/7869-user-guide.pdf. Accessed on the 5th May 2009.
    • (2008) 7869 2008-A SCR Clinical User Guide
  • 10
    • 78049397804 scopus 로고    scopus 로고
    • Risk-Adaptable Access Control (RAdAC)
    • NIST - National Institute of Standards and Technology - Information Technology Laboratory
    • McGraw R. Risk-Adaptable Access Control (RAdAC). Privilege (Access) Management Workshop. NIST - National Institute of Standards and Technology - Information Technology Laboratory. 2009.
    • (2009) Privilege (Access) Management Workshop
    • McGraw, R.1
  • 13
    • 70450235104 scopus 로고    scopus 로고
    • Extending Access Control Models with Break-glass
    • Brucker A., Petrisch H. Extending Access Control Models with Break-glass. SACMAT'09. 2009.
    • (2009) SACMAT'09
    • Brucker, A.1    Petrisch, H.2
  • 15
    • 77950851394 scopus 로고
    • Extending access controls with duties - Realized by active mechanisms
    • North-Holland
    • Jonscher D. Extending access controls with duties - realized by active mechanisms. Database Security IV: Status and Prospects. North-Holland. 1993.
    • (1993) Database Security IV: Status and Prospects
    • Jonscher, D.1
  • 18
    • 1142309815 scopus 로고    scopus 로고
    • Provisions and obligations in policy management and security applications
    • Bettini C.,Jajodia S.,Wang X., Wijesekera D. Provisions and obligations in policy management and security applications. In VLDB. 2002.
    • (2002) VLDB
    • Bettini, C.1    Jajodia, S.2    Wang, X.3    Wijesekera, D.4
  • 21
    • 77950793471 scopus 로고    scopus 로고
    • Lei 12/2005 - Informação de genética pessoal e informação de saúde
    • Lei 12/2005 - Informação de genética pessoal e informação de saúde. Diário da República - Série A, no 18. 2005.
    • (2005) Diário da República - Série A , Issue.18


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.