An administrative role-based access control (AR-BAC) model specifies administrative policies over a role-based access control (RBAC) system, where an administrative permission may change an RBAC policy by updating permissions assigned to roles, or assigning/revoking users to/from roles. Conse-quently, enforcing ARBAC policies over an active access controller while some users are using pro-tected resources would result in conflicts: a policy may be in effect in the RBAC system while being updated by an ARBAC operation. Towards solv-ing this concurrency problem, we propose a session-aware administrative model for RBAC. We show how the concurrency problem can be resolved by en-hancing the eXtensible Access Control Markup Lan-guage (XACML) refe...
Project (M.S., Computer Science)--California State University, Sacramento, 2014This project is a con...
peer reviewedA role-based access control (RBAC) policy restricts a user to perform operations based ...
Role Based Access Control (RBAC) [6] is a popular approach to specify and enforce security policies ...
The XML Role-Based Access Control (X-RBAC) specification language addresses multidomain environments...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
Access control systems must adjust to evolving business needs, such as accommodating new and...
peer reviewedA Role-based Access Control (RBAC) mechanism prevents unauthorized users to perform an ...
Abstract: Role-Based Access Control (RBAC) has proven as a cost effective as well as a practical sol...
Abstract. Role-based access control (RBAC) is a commercially dom-inant model, standardized by the Na...
XACML has become the defacto standard for enterprise- wide, policy-based access control. It is a str...
Role based access control (RBAC) is a widely used approach to access control with well-known advanta...
Abstract This article introduces a family of reference models for role-based access control (RBAC) i...
Part 2: Access ControlInternational audienceAccess control is widely used in large systems for restr...
Besides the well established access control models, Discretionary Access Control (DAC) and Mandatory...
RBAC (role-based access control) is emphasized recently due to its simpleness, flexibility, finegrai...
Project (M.S., Computer Science)--California State University, Sacramento, 2014This project is a con...
peer reviewedA role-based access control (RBAC) policy restricts a user to perform operations based ...
Role Based Access Control (RBAC) [6] is a popular approach to specify and enforce security policies ...
The XML Role-Based Access Control (X-RBAC) specification language addresses multidomain environments...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
Access control systems must adjust to evolving business needs, such as accommodating new and...
peer reviewedA Role-based Access Control (RBAC) mechanism prevents unauthorized users to perform an ...
Abstract: Role-Based Access Control (RBAC) has proven as a cost effective as well as a practical sol...
Abstract. Role-based access control (RBAC) is a commercially dom-inant model, standardized by the Na...
XACML has become the defacto standard for enterprise- wide, policy-based access control. It is a str...
Role based access control (RBAC) is a widely used approach to access control with well-known advanta...
Abstract This article introduces a family of reference models for role-based access control (RBAC) i...
Part 2: Access ControlInternational audienceAccess control is widely used in large systems for restr...
Besides the well established access control models, Discretionary Access Control (DAC) and Mandatory...
RBAC (role-based access control) is emphasized recently due to its simpleness, flexibility, finegrai...
Project (M.S., Computer Science)--California State University, Sacramento, 2014This project is a con...
peer reviewedA role-based access control (RBAC) policy restricts a user to perform operations based ...
Role Based Access Control (RBAC) [6] is a popular approach to specify and enforce security policies ...