메뉴 건너뛰기




Volumn 3, Issue 2, 2000, Pages 85-106

Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies

Author keywords

discretionary access control; lattice based access control; Management; mandatory access control; Role based access control; Security

Indexed keywords


EID: 84884311106     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/354876.354878     Document Type: Article
Times cited : (447)

References (20)
  • 2
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • In Proceedings of IEEE Symposium on Security and Privacy (Oakland, CA, May)
    • Clark, D. and Wilson, D. 1987. A comparison of commercial and military computer security policies. In Proceedings of IEEE Symposium on Security and Privacy (Oakland, CA, May). 184-194
    • (1987) , pp. 184-194
    • Clark, D.1    Wilson, D.2
  • 3
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • Denning, D. E. 1976. A lattice model of secure information flow. Commun. ACM 19, 2, 236-243
    • (1976) Commun. ACM , vol.19 , Issue.2 , pp. 236-243
    • Denning, D.E.1
  • 5
    • 85024266270 scopus 로고
    • Protection. In Proceedings of the 5th Symposium on Information Sciences and Systems (Princeton, NJ, Mar.)
    • Lampson, B. 1974. Protection. In Proceedings of the 5th Symposium on Information Sciences and Systems (Princeton, NJ, Mar.). 437-443
    • (1974) , pp. 437-443
    • Lampson, B.1
  • 6
    • 0023859517 scopus 로고
    • commercial
    • security. In Proceedings of IEEE Symposium on Security and Privacy (Oakland, CA)
    • Lee, T. 1988. Using mandatory integrity to enforce “commercial” security. In Proceedings of IEEE Symposium on Security and Privacy (Oakland, CA). 140-146
    • (1988) Using mandatory integrity to enforce , pp. 140-146
    • Lee, T.1
  • 7
    • 33846529690 scopus 로고    scopus 로고
    • Administrative models for role-based access control
    • Ph.D. Dissertation
    • Munawer, Q. 2000. Administrative models for role-based access control. Ph.D. Dissertation
    • (2000)
    • Munawer, Q.1
  • 8
    • 0010573970 scopus 로고
    • Access rights administration in role-based security systems
    • In Proceedings of the IFIP Working Group 11.3 Working Conference on Database Security. Elsevier North-Holland, Inc., Amsterdam, The Netherlands
    • Nyanchama, M. and Osborn, S. 1994. Access rights administration in role-based security systems. In Proceedings of the IFIP Working Group 11.3 Working Conference on Database Security. Elsevier North-Holland, Inc., Amsterdam, The Netherlands, 37-56
    • (1994) , pp. 37-56
    • Nyanchama, M.1    Osborn, S.2
  • 9
    • 1242349397 scopus 로고    scopus 로고
    • Modeling mandatory access control in role-based security systems
    • Chapman and Hall Ltd., London, UK
    • Nyanchama, M. and Osborn, S. 1996. Modeling mandatory access control in role-based security systems. In Database Security VIII: Status and Prospects. Chapman and Hall, Ltd., London, UK, 129-144
    • (1996) Database Security VIII: Status and Prospects , pp. 129-144
    • Nyanchama, M.1    Osborn, S.2
  • 10
    • 0001940210 scopus 로고    scopus 로고
    • The role graph model and conflict of interest
    • (Feb.)
    • Nyanchama, M. and Osborn, S. 1999. The role graph model and conflict of interest. ACM Trans. Inf. Syst. Secur. 1, 2 (Feb.), 3-33
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.1 , pp. 3-33
    • Nyanchama, M.1    Osborn, S.2
  • 11
    • 0031379040 scopus 로고    scopus 로고
    • Mandatory access control and role-based access control revisited
    • In Proceedings of the Second ACM Workshop on Role-based Access Control (RBAC '97, Fairfax, VA, Nov. 6-7), C. Youman, E. Coyne, and T. Jaeger, Chairs. ACM Press, New York, NY
    • Osborn, S. 1997. Mandatory access control and role-based access control revisited. In Proceedings of the Second ACM Workshop on Role-based Access Control (RBAC '97, Fairfax, VA, Nov. 6-7), C. Youman, E. Coyne, and T. Jaeger, Chairs. ACM Press, New York, NY, 31-40
    • (1997) , pp. 31-40
    • Osborn, S.1
  • 12
    • 34548022060 scopus 로고    scopus 로고
    • On the interaction between role-based access control and relational databases
    • Status and Prospects (Como, Italy, July 22-24, P. Samarati and R. S. Sandhu, Eds. Chapman and Hall, Ltd., London, UK
    • Osborn, S., Reid, L. K., and Wesson, G. J. 1997. On the interaction between role-based access control and relational databases. In Proceedings of the Tenth Annual IFIP TC11/ WG11.3 International Conference on Database Security: Volume X: Status and Prospects (Como, Italy, July 22-24, 1996), P. Samarati and R. S. Sandhu, Eds. Chapman and Hall, Ltd., London, UK, 275-287
    • (1997) Proceedings of the Tenth Annual IFIP TC11/ WG11.3 International Conference on Database Security , vol.X , pp. 275-287
    • Osborn, S.1    Reid, L.K.2    Wesson, G.J.3
  • 13
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • Sandhu, R. S. 1993. Lattice-based access control models. IEEE Computer 26, 11, 9-19
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.S.1
  • 14
    • 50249183308 scopus 로고    scopus 로고
    • Role hierarchies and constraints for lattice-based access controls
    • In Proceedings of the Conference on Computer Security (ESORICS 96, Rome, Italy), E. Bertino, H. Kurth, G. Martella, and E. Montolivo, Eds. Springer-Verlag, New York, NY
    • Sandhu, R. 1996. Role hierarchies and constraints for lattice-based access controls. In Proceedings of the Conference on Computer Security (ESORICS 96, Rome, Italy), E. Bertino, H. Kurth, G. Martella, and E. Montolivo, Eds. Springer-Verlag, New York, NY, 65-79
    • (1996) , pp. 65-79
    • Sandhu, R.1
  • 15
    • 0001549660 scopus 로고    scopus 로고
    • The ARBAC97 model for role-based administration of roles
    • (Feb.)
    • Sandhu, R. S., Bhamidipati, V., and Munawer, Q. 1999. The ARBAC97 model for role-based administration of roles. ACM Trans. Inf. Syst. Secur. 1, 2 (Feb.), 105-135
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.1 , pp. 105-135
    • Sandhu, R.S.1    Bhamidipati, V.2    Munawer, Q.3
  • 17
    • 0031599992 scopus 로고    scopus 로고
    • How to do discretionary access control using roles
    • In Proceedings of the Third ACM Workshop on Role-Based Access Control (RBAC '98, Fairfax, VA, Oct. 22-23), C. Youman and T. Jaeger, Chairs. ACM Press, New York, NY
    • Sandhu, R. and Munawer, Q. 1998. How to do discretionary access control using roles. In Proceedings of the Third ACM Workshop on Role-Based Access Control (RBAC '98, Fairfax, VA, Oct. 22-23), C. Youman and T. Jaeger, Chairs. ACM Press, New York, NY, 47-54
    • (1998) , pp. 47-54
    • Sandhu, R.1    Munawer, Q.2
  • 18
    • 0028513932 scopus 로고
    • Access control: Principles and practice
    • Sandhu, R. and Samarati, P. 1994. Access control: Principles and practice. IEEE Commun. Mag. 32, 9, 40-48
    • (1994) IEEE Commun. Mag. , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.1    Samarati, P.2
  • 19
    • 0037510581 scopus 로고    scopus 로고
    • Authentication, access control and intrusion detection
    • A. B. Tucker, Ed. CRC Press, Inc., Boca Raton, FL
    • Sandhu, R. S. and Samarati, P. 1997. Authentication, access control and intrusion detection. In The Computer Science and Engineering Handbook, A. B. Tucker, Ed. CRC Press, Inc., Boca Raton, FL, 1929-1948
    • (1997) The Computer Science and Engineering Handbook , pp. 1929-1948
    • Sandhu, R.S.1    Samarati, P.2
  • 20
    • 6444224063 scopus 로고
    • Implementing the Clark/Wilson integrity policy using current technology
    • In Proceedings of the 11th National Computer Security Conference (NIST-NCSC, Baltimore, Maryland, Oct.17-20). National Institute of Standards and Technology, Gaithersburg, MD
    • Schockley, W. 1988. Implementing the Clark/Wilson integrity policy using current technology. In Proceedings of the 11th National Computer Security Conference (NIST-NCSC, Baltimore, Maryland, Oct.17-20). National Institute of Standards and Technology, Gaithersburg, MD, 29-37
    • (1988) , pp. 29-37
    • Schockley, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.