Permission-role assignment is an important issue in role-based access control (RBAC). There are two types of problems that may arise in permission-role assignment. One is related to authorization granting process. Conflicting permissions may be granted to a role, and as a result, users with the role may have or derive a high level of authority. The other is related to authorization revocation. When a permission is revoked from a role, the role may still have the permission from other roles. In this paper, we discuss granting and revocation models related to mobile and immobile memberships between permissions and roles, then provide proposed authorization granting algorithm to check conflicts and help allocate the permissions without comprom...
One of the most challenging problems in managing large networks is the complexity of security admini...
[Abstract]: Role-based delegation model (RBDM) based on role-based access control (RBAC) has proven ...
reciprocity is a powerful determinant of human behavior. None of the existing access control models ...
Abstract. Permission-role assignment is an important issue in role-based access control (RBAC). Ther...
In this paper, we develop formal authorization alloca-tion algorithms for role-based access control ...
In this paper, we develop formal authorization allocation algorithms for role-based access control ...
The mobility of user-role relationship is a new feature relative to their counterparts in user-role ...
Permission-role assignments (PRA) is one important process in Role-based access control (RBAC) which...
In practice, assigning access permissions to users must satisfy a variety of constraints motivated b...
A flexible payment scheme and its permission-role assignments are proposed in this paper. The scheme...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
The ubiquity of the Internet has led to increased resource sharing between large numbers of users in...
Sharing of information is fundamental to modern computing environments across many application domai...
Our society is increasingly moving towards richer forms of information exchange where mobility of pr...
In this paper, we follow the line of existing study on cryptographic enforcement of Role-Based Acces...
One of the most challenging problems in managing large networks is the complexity of security admini...
[Abstract]: Role-based delegation model (RBDM) based on role-based access control (RBAC) has proven ...
reciprocity is a powerful determinant of human behavior. None of the existing access control models ...
Abstract. Permission-role assignment is an important issue in role-based access control (RBAC). Ther...
In this paper, we develop formal authorization alloca-tion algorithms for role-based access control ...
In this paper, we develop formal authorization allocation algorithms for role-based access control ...
The mobility of user-role relationship is a new feature relative to their counterparts in user-role ...
Permission-role assignments (PRA) is one important process in Role-based access control (RBAC) which...
In practice, assigning access permissions to users must satisfy a variety of constraints motivated b...
A flexible payment scheme and its permission-role assignments are proposed in this paper. The scheme...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
The ubiquity of the Internet has led to increased resource sharing between large numbers of users in...
Sharing of information is fundamental to modern computing environments across many application domai...
Our society is increasingly moving towards richer forms of information exchange where mobility of pr...
In this paper, we follow the line of existing study on cryptographic enforcement of Role-Based Acces...
One of the most challenging problems in managing large networks is the complexity of security admini...
[Abstract]: Role-based delegation model (RBDM) based on role-based access control (RBAC) has proven ...
reciprocity is a powerful determinant of human behavior. None of the existing access control models ...