메뉴 건너뛰기




Volumn 3, Issue 4, 2000, Pages 207-226

Role-Based Authorization Constraints Specification

Author keywords

Access control models; authorization constraints; constraints specification; Languages; role based access control; Security

Indexed keywords


EID: 84956993736     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/382912.382913     Document Type: Article
Times cited : (348)

References (14)
  • 1
    • 0011044328 scopus 로고    scopus 로고
    • The RCL 2000 language for specifying role-based authorization constraints
    • Ph.D. Dissertation. George Mason Univ., Fairfax, VA
    • Ahn, G.-J. 2000. The RCL 2000 language for specifying role-based authorization constraints. Ph.D. Dissertation. George Mason Univ., Fairfax, VA
    • (2000)
    • Ahn, G.-J.1
  • 2
    • 85031151129 scopus 로고    scopus 로고
    • The RSL99 language for role-based separation of duty constraints
    • In Proceedings of 4th ACM Workshop on Role-Based Access Control (RBAC '99, Fairfax, VA, Oct. 28-29). ACM, New York, NY
    • Ahn, G. -J. and Sandhu, R. 1999. The RSL99 language for role-based separation of duty constraints. In Proceedings of 4th ACM Workshop on Role-Based Access Control (RBAC '99, Fairfax, VA, Oct. 28-29). ACM, New York, NY, 43-54
    • (1999) , pp. 43-54
    • Ahn, G.-J.1    Sandhu, R.2
  • 3
    • 0029425954 scopus 로고
    • Constraints for role-based access control
    • In Proceedings of the first ACM Workshop on Role-Based Access Control (RBAC '95, Gaithersburg, MD, Nov. 30-Dec. 1), C. E. Youman, R. S. Sandhu, and E. J. Coyne, Eds. ACM Press, New York, NY
    • Chen, F. and Sandhu, R. S. 1995. Constraints for role-based access control. In Proceedings of the first ACM Workshop on Role-Based Access Control (RBAC '95, Gaithersburg, MD, Nov. 30-Dec. 1), C. E. Youman, R. S. Sandhu, and E. J. Coyne, Eds. ACM Press, New York, NY, 39-46
    • (1995) , pp. 39-46
    • Chen, F.1    Sandhu, R.S.2
  • 4
    • 0029711136 scopus 로고    scopus 로고
    • A formal model for role-based access control with constraints
    • In Proceedings of 9th IEEE Workshop on Computer Security Foundations (Kenmare, Ireland, June). IEEE Press, Piscataway, NJ
    • Giuri, L. and Iglio, P. 1996. A formal model for role-based access control with constraints. In Proceedings of 9th IEEE Workshop on Computer Security Foundations (Kenmare, Ireland, June). IEEE Press, Piscataway, NJ, 136-145
    • (1996) , pp. 136-145
    • Giuri, L.1    Iglio, P.2
  • 5
    • 0031682433 scopus 로고    scopus 로고
    • On the formal definition of separation-of-duty policies and their composition
    • In Proceedings of the 1998 IEEE Computer Society Symposium on Research in Security and Privacy (Oakland, CA, May). IEEE Computer Society Press, Los Alamitos, CA
    • Gligor, V. D., Gavrila, S., and Ferraiolo, D. 1998. On the formal definition of separation-of-duty policies and their composition. In Proceedings of the 1998 IEEE Computer Society Symposium on Research in Security and Privacy (Oakland, CA, May). IEEE Computer Society Press, Los Alamitos, CA, 172-183
    • (1998) , pp. 172-183
    • Gligor, V.D.1    Gavrila, S.2    Ferraiolo, D.3
  • 6
    • 0242528825 scopus 로고    scopus 로고
    • On the increasing importance of constraints
    • In Proceedings of 4th ACM Workshop on Role-Based Access Control (RBAC '99, Fairfax, VA, Oct. 28-29). ACM, New York, NY
    • Jaeger, T. 1999. On the increasing importance of constraints. In Proceedings of 4th ACM Workshop on Role-Based Access Control (RBAC '99, Fairfax, VA, Oct. 28-29). ACM, New York, NY, 33-42
    • (1999) , pp. 33-42
    • Jaeger, T.1
  • 7
    • 0031346670 scopus 로고    scopus 로고
    • Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems
    • In Proceedings of the Second ACM Workshop on Role-based Access Control (RBAC '97, Fairfax, VA, Nov. 6-7), C. Youman, E. Coyne, and T. Jaeger, Chairs. ACM Press, New York, NY
    • Kuhn, D. R. 1997. Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. In Proceedings of the Second ACM Workshop on Role-based Access Control (RBAC '97, Fairfax, VA, Nov. 6-7), C. Youman, E. Coyne, and T. Jaeger, Chairs. ACM Press, New York, NY, 23-30
    • (1997) , pp. 23-30
    • Kuhn, D.R.1
  • 8
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • (May)
    • Osborn, S., Sandhu, R., and Munawer, Q. 2000. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Inf. Syst. Secur. 3, 2 (May)
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , pp. 2
    • Osborn, S.1    Sandhu, R.2    Munawer, Q.3
  • 9
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • Sandhu, R. S. 1993. Lattice-based access control models. IEEE Computer 26, 11, 9-19
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.S.1
  • 10
    • 0033652039 scopus 로고    scopus 로고
    • The NIST model for role-based access control: Towards a unified standard. In Proceedings of 5th ACM Workshop on Role-Based Access Control (RBAC '00, Berlin, Germany, July 26 - 27). ACM, New York, NY
    • Sandhu, R., Ferraiolo, D., and Kuhn, R. 2000. The NIST model for role-based access control: Towards a unified standard. In Proceedings of 5th ACM Workshop on Role-Based Access Control (RBAC '00, Berlin, Germany, July 26 - 27). ACM, New York, NY, 47-63
    • (2000) , pp. 47-63
    • Sandhu, R.1    Ferraiolo, D.2    Kuhn, R.3
  • 11
    • 0031599992 scopus 로고    scopus 로고
    • How to do discretionary access control using roles
    • In Proceedings of the Third ACM Workshop on Role-Based Access Control (RBAC '98, Fairfax, VA, Oct. 22-23), C. Youman and T. Jaeger, Chairs. ACM Press, New York, NY
    • Sandhu, R. and Munawer, Q. 1998. How to do discretionary access control using roles. In Proceedings of the Third ACM Workshop on Role-Based Access Control (RBAC '98, Fairfax, VA, Oct. 22-23), C. Youman and T. Jaeger, Chairs. ACM Press, New York, NY, 47-54
    • (1998) , pp. 47-54
    • Sandhu, R.1    Munawer, Q.2
  • 12
    • 0011590541 scopus 로고    scopus 로고
    • Role hierarchies and constraints for lattice-based access controls
    • In Proceedings of the Fourth European Symposium on Research in Computer Security (ESO-RICS96, Rome, Italy, Sept. 25-27), E. Bertino, Ed. Springer-Verlag, New York, NY
    • Sandhu, R. S. 1996. Role hierarchies and constraints for lattice-based access controls. In Proceedings of the Fourth European Symposium on Research in Computer Security (ESO-RICS96, Rome, Italy, Sept. 25-27), E. Bertino, Ed. Springer-Verlag, New York, NY
    • (1996)
    • Sandhu, R.S.1
  • 14
    • 0030644642 scopus 로고    scopus 로고
    • Separation of duty in role based access control environments
    • In Proceedings of the 10th IEEE Workshop on Computer Security Foundations (Rockport, MA, June 10-12). IEEE Computer Society Press, Los Alamitos, CA
    • Simon, R. and Zurko, M. E. 1997. Separation of duty in role based access control environments. In Proceedings of the 10th IEEE Workshop on Computer Security Foundations (Rockport, MA, June 10-12). IEEE Computer Society Press, Los Alamitos, CA, 183-194
    • (1997) , pp. 183-194
    • Simon, R.1    Zurko, M.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.