Abstract. This paper presents a framework for representing and distributing access control policies in distributed heterogeneous systems. Access control polices follows the RBAC (Role Based Access Control) model proposed by the NIST. The framework is based on the provisioning strategy defined by IETF, i.e., the RBAC information is represented in terms of a PIB (Policy Information Base) and distributed to the enforcement elements using the COPS-PR protocol. This approach can be explored in several scenarios for configuring both network devices and RBAC-aware applications. A research prototype has been implemented, and the results obtained from a performance analysis of the proposed extensions are summarized and evaluated. 1
Abstract. Because the distribution of services and resources in wide-area networks are heterogeneous...
More and more the engineering of complex agent-based systems calls for infrastructural support for c...
Role Based Access Control (RBAC) [6] is a popular approach to specify and enforce security policies ...
This paper presents a framework for representing and distributing access control policies in distrib...
International audienceSince its formalization RBAC has become the yardstick for the evaluation of ac...
Large and distributed access control systems are increasingly common, for example in health care. In...
Role-based access control (RBAC) is increasingly attracting attention because it reduces the complex...
This paper presents a reference architecture (or conceptual framework) for the specification and enf...
We address the distributed setting for enforcement of a centralized Role-Based Access Control (RBAC)...
Multidomain application environments where distributed multiple organizations interoperate with each...
Access control (AC) is the core of every architectural solution for information security. Indeed, no...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
Role-based access control (RBAC) is increasingly attracting attention because it reduces the complex...
Abstract This article introduces a family of reference models for role-based access control (RBAC) i...
The analysis of security policies designed for ICS and SCADA can benefit significantly from the adop...
Abstract. Because the distribution of services and resources in wide-area networks are heterogeneous...
More and more the engineering of complex agent-based systems calls for infrastructural support for c...
Role Based Access Control (RBAC) [6] is a popular approach to specify and enforce security policies ...
This paper presents a framework for representing and distributing access control policies in distrib...
International audienceSince its formalization RBAC has become the yardstick for the evaluation of ac...
Large and distributed access control systems are increasingly common, for example in health care. In...
Role-based access control (RBAC) is increasingly attracting attention because it reduces the complex...
This paper presents a reference architecture (or conceptual framework) for the specification and enf...
We address the distributed setting for enforcement of a centralized Role-Based Access Control (RBAC)...
Multidomain application environments where distributed multiple organizations interoperate with each...
Access control (AC) is the core of every architectural solution for information security. Indeed, no...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
Role-based access control (RBAC) is increasingly attracting attention because it reduces the complex...
Abstract This article introduces a family of reference models for role-based access control (RBAC) i...
The analysis of security policies designed for ICS and SCADA can benefit significantly from the adop...
Abstract. Because the distribution of services and resources in wide-area networks are heterogeneous...
More and more the engineering of complex agent-based systems calls for infrastructural support for c...
Role Based Access Control (RBAC) [6] is a popular approach to specify and enforce security policies ...