There is growing interest in collaboration and resource sharing among institutions and organizations. Identity based security policies are not enough to address access control in such distributed environments. In this paper, we investigate the problems of identity management inherent in distributed subscription-based resource sharing. We extend Role Base Access Control (RBAC) to a distributed environment and implement a distributed role based access control model (DRBAC). We define the concept of subject, role, distributed role, permission and autonomous organization as applicable to the distributed remote resource sharing service. Access is allowed based on the distributed roles, subject to certain constraints. Enforcing distributed role b...
Large and distributed access control systems are increasingly common, for example in health care. In...
There is growing interest in collaboration and resource sharing among institutions and organization...
The Role-Based Access Control (RBAC) model has been widely applied to a single domain in which users...
The problems of identity management inherent in distributed subscription-based resource sharing are ...
Role Based Access Control (RBAC) [6] is a popular approach to specify and enforce security policies ...
Much of the work to date to apply Role-Based Access Control (RBAC) to database management systems ha...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
Modern collaborative systems such as the Grid computing paradigm are capable of providing resource s...
Ensuring secure and authorized access to remote services and information resources in a dynamic coll...
International audienceSince its formalization RBAC has become the yardstick for the evaluation of ac...
Role-based access control (RBAC) is recognized as an efficient access control model and its delegati...
Permission-role assignments (PRA) is one important process in Role-based access control (RBAC) which...
Role-based access control (RBAC) is increasingly attracting attention because it reduces the comple...
Role-based delegation model(RBDM) based on the role-based access model (RBAM) has proven to be a fle...
The collaboration among different organizations is considered one of the main benefits of moving app...
Large and distributed access control systems are increasingly common, for example in health care. In...
There is growing interest in collaboration and resource sharing among institutions and organization...
The Role-Based Access Control (RBAC) model has been widely applied to a single domain in which users...
The problems of identity management inherent in distributed subscription-based resource sharing are ...
Role Based Access Control (RBAC) [6] is a popular approach to specify and enforce security policies ...
Much of the work to date to apply Role-Based Access Control (RBAC) to database management systems ha...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
Modern collaborative systems such as the Grid computing paradigm are capable of providing resource s...
Ensuring secure and authorized access to remote services and information resources in a dynamic coll...
International audienceSince its formalization RBAC has become the yardstick for the evaluation of ac...
Role-based access control (RBAC) is recognized as an efficient access control model and its delegati...
Permission-role assignments (PRA) is one important process in Role-based access control (RBAC) which...
Role-based access control (RBAC) is increasingly attracting attention because it reduces the comple...
Role-based delegation model(RBDM) based on the role-based access model (RBAM) has proven to be a fle...
The collaboration among different organizations is considered one of the main benefits of moving app...
Large and distributed access control systems are increasingly common, for example in health care. In...
There is growing interest in collaboration and resource sharing among institutions and organization...
The Role-Based Access Control (RBAC) model has been widely applied to a single domain in which users...