Abstract. Access control models provide an important means for the system-atic specification and management of the permissions in a business information system. While a number of well-known access control models exists (such as the role-based access control model, for example), standard access control models are often not suited for handling exceptional situations. In this context, the demand to increase the flexibility of access management has especially been approached via the development of delegation models and break-glass models. This paper presents the results of a literature review for 329 delegation and break-glass approaches. We give an overview on the existing body of scientific literature in these two areas and compare 35 selecte...
The characteristics of delegation are analyzed and defined in this paper, including time, totality, ...
Access control must provide a secure environment for collaboration among independent organizations w...
Administration of an access control model deals with the question of who is authorized to update pol...
Abstract- As information systems became widely used by organizations and enterprises, resource shari...
International audienceIn the field of access control, delegation is an important aspect that is cons...
peer reviewedIn healthcare security, Role-based Access Control (RBAC) should be flexible and include...
Access control is important for protecting the information integrities in WfMS’s. Compared to conven...
Abstract: Delegation is a proIIlIsmg alternative to traditional role administration paradigms in rol...
Abstract This article introduces a family of reference models for role-based access control (RBAC) i...
Abstract. Delegation is a mechanism that allows a user A to act on another user B’s behalf by making...
One of the most challenging problems in managing large networks is the complexity of security admini...
One reason workflow systems have been criticized as being inflexible is that they lack support for d...
Role-based access control (RBAC) is recognized as an efficient access control model and its delegati...
Abstract. In the past five years there has been tremendous activity in rolebased access control (RBA...
Abstract. Security of an information system is becoming an increas-ingly critical issue. Access cont...
The characteristics of delegation are analyzed and defined in this paper, including time, totality, ...
Access control must provide a secure environment for collaboration among independent organizations w...
Administration of an access control model deals with the question of who is authorized to update pol...
Abstract- As information systems became widely used by organizations and enterprises, resource shari...
International audienceIn the field of access control, delegation is an important aspect that is cons...
peer reviewedIn healthcare security, Role-based Access Control (RBAC) should be flexible and include...
Access control is important for protecting the information integrities in WfMS’s. Compared to conven...
Abstract: Delegation is a proIIlIsmg alternative to traditional role administration paradigms in rol...
Abstract This article introduces a family of reference models for role-based access control (RBAC) i...
Abstract. Delegation is a mechanism that allows a user A to act on another user B’s behalf by making...
One of the most challenging problems in managing large networks is the complexity of security admini...
One reason workflow systems have been criticized as being inflexible is that they lack support for d...
Role-based access control (RBAC) is recognized as an efficient access control model and its delegati...
Abstract. In the past five years there has been tremendous activity in rolebased access control (RBA...
Abstract. Security of an information system is becoming an increas-ingly critical issue. Access cont...
The characteristics of delegation are analyzed and defined in this paper, including time, totality, ...
Access control must provide a secure environment for collaboration among independent organizations w...
Administration of an access control model deals with the question of who is authorized to update pol...