- FCK95.David Ferraiolo, Janet Cugini, and Richard Kuhn. Role-based access control (RBAC): Features and motivations. In Proceedings of llth Annual Computer Security Application Conference, pages 241-48, New Orleans, LA, December 11-15 1995.]]Google Scholar
- FK92.David Ferraiolo and Richard Kuhn. Rolebased access controls. In Proceedings of 15th NIST-NCSC National Computer Security Conference, pages 554 563, Baltimore, MD, October 13-16 1992.]]Google Scholar
- GI96.Luigi Guiri and Pietro Iglio. A formal model for role-based access control with constraints. In Proceedings of IEEE Computer Security Foundations Workshop 9, pages 136-145, Kenmare, Ireland, June 1996.]] Google ScholarDigital Library
- Gui95.Luigi Guiri. A new model for role-based access control. In Proceedings of 11th Annual Computer Security Application Conference, pages 249-255, New Orleans, LA, December 11-15 1995.]]Google Scholar
- HDT95.M.-Y. Hu, S.A. Demurjian, and T.C. Ting. User-role based security in the ADAM object-oriented design and analyses environment. In J. Biskup, M. Morgernstern, and C. Landwehr, editors, Database Security VIII: Status and Prospects. North- Holland, 1995.]]Google ScholarDigital Library
- MD94.Imtiaz Mohammed and David M. Dilts. Design for dynamic user-role-based security. Computers ~ Security, 13(8):661-671, 1994.]]Google Scholar
- NO95.Matunda Nyanchama and Sylvia Osborn. Access rights administration in role-based security systems. In J. Biskup, M. Morgernstern, and C. Landwehr, editors, Database Security VIII: Status and Prospects. North- Holland, 1995.]] Google ScholarDigital Library
- San97.Ravi Sandhu. Rationale for the RBAC96 family of access control models. In Proceedings of the 1st A CM Workshop on Role- Based Access Control. ACM, 1997.]] Google ScholarDigital Library
- SB97.Ravi Sandhu and Venkata Bhamidipati. Role-based administration of user-role assignment: The URA97 model and its Oracle implementation. In T. Y. Lin and Xiaolei Qian, editors, Database Security XI: Status and Prospects. North-Holland, to appear.]]Google Scholar
- SCFY96.Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. Rolebased access control models. IEEE Computer, 29(2):38-47, February 1996.]] Google ScholarDigital Library
- vSvdM94.S. H. yon Solms and Isak van der Merwe. The management of computer security profiles using a role-oriented approach. Computers ~4 Security, 13(8):673-680, 1994.]]Google Scholar
- YCS97.Charles Youman, Ed Coyne, and Ravi Sandhu, editors. Proceedings of the'. 1st A CM Workshop on Role-Based Access Control, Nov 31-Dec. 1, 1995. ACM, 1997.]] Google Scholar
Index Terms
- The ARBAC97 model for role-based administration of roles: preliminary description and outline
Recommendations
A model for role administration using organization structure
SACMAT '02: Proceedings of the seventh ACM symposium on Access control models and technologiesRole-based access control (RBAC) is recognized as an excellent model for access control in an enterprise environment. In large enterprises, effective RBAC administration is a major issue. ARBAC97 is a well-known solution for decentralized RBAC ...
The ARBAC97 model for role-based administration of roles
Special issue on role-based access controlIn role-based access control (RBAC), permissions are associated with roles' and users are made members of roles, thereby acquiring the roles; permissions. RBAC's motivation is to simplify administration of authorizations. An appealing possibility is to ...
The ARBAC99 Model for Administration of Roles
ACSAC '99: Proceedings of the 15th Annual Computer Security Applications ConferenceRole-Based Access Control (RBAC) is a flexible and policy-neutral access control technology. For large systems|with hundreds of roles, thousands of users and millions of permissions|managing roles, users, permissions and their interrelationships is a ...
Comments