Role-based access control (RBAC) has become today's dominant access control model, and many of its theoretical and practical aspects are well understood. However, certain aspects of more advanced RBAC models, such as the relationship between permission usage and role activation and the interaction between inheritance and constraints, remain poorly understood. Moreover, the computational complexity of some important problems in RBAC remains unknown. In this thesis we consider these issues, develop new RBAC models and answer a number of these questions. We develop an extended RBAC model that proposes an alternative way to distinguish between activation and usage hierarchies. Our extended RBAC model has well-defined semantics, derived from ...
Pervasive computing environments have created a requirement for spatial- and temporal-aware access c...
Interest in role-based access control has generated considerable research activity in recent years. ...
In practice, assigning access permissions to users must satisfy a variety of constraints motivated b...
Role-based access control (RBAC) has become today's dominant access control model, and many of its t...
Role-based access control (RBAC) has become today's dominant access control model, and many of its t...
Role-based access control (RBAC) has become today's dominant access control model, and many of its t...
Role-based access control (RBAC) has become today's dominant access control model, and many of its t...
Role-based access control (RBAC) has become today's dominant access control model, and many of its t...
Role-based access control (RBAC) has become today's dominant access control model, and many of its t...
Role-based access control (RBAC) has become today's dominant access control model, and many of its t...
Role-based access control (RBAC) has become today's dominant access control model, and many of its t...
Role-based access control (RBAC) has become today's dominant access control model, and many of its t...
Role-based access control (RBAC) has become today's dominant access control model, and many of its t...
Role-based access control (RBAC) has become today's dominant access control model, and many of its t...
Role-based access control (RBAC) has become today's dominant access control model, and many of its t...
Pervasive computing environments have created a requirement for spatial- and temporal-aware access c...
Interest in role-based access control has generated considerable research activity in recent years. ...
In practice, assigning access permissions to users must satisfy a variety of constraints motivated b...
Role-based access control (RBAC) has become today's dominant access control model, and many of its t...
Role-based access control (RBAC) has become today's dominant access control model, and many of its t...
Role-based access control (RBAC) has become today's dominant access control model, and many of its t...
Role-based access control (RBAC) has become today's dominant access control model, and many of its t...
Role-based access control (RBAC) has become today's dominant access control model, and many of its t...
Role-based access control (RBAC) has become today's dominant access control model, and many of its t...
Role-based access control (RBAC) has become today's dominant access control model, and many of its t...
Role-based access control (RBAC) has become today's dominant access control model, and many of its t...
Role-based access control (RBAC) has become today's dominant access control model, and many of its t...
Role-based access control (RBAC) has become today's dominant access control model, and many of its t...
Role-based access control (RBAC) has become today's dominant access control model, and many of its t...
Role-based access control (RBAC) has become today's dominant access control model, and many of its t...
Pervasive computing environments have created a requirement for spatial- and temporal-aware access c...
Interest in role-based access control has generated considerable research activity in recent years. ...
In practice, assigning access permissions to users must satisfy a variety of constraints motivated b...