- San97.Ravi Sandhu, Role-Based Access Control, September 17, 1997Google Scholar
- SBC+97.Ravi Sandhu, Venkata Bhamidipafi, Edward Coyne, Sfinivas Ganata, and Charles Youman. The ARBAC97 Model for Role-Based Administration of Roles: Preliminary Description and Outline, Proceedings of the 2~ A CM Workship on Role-Based Access Control, ACM, 1997 Google ScholarDigital Library
- SS94.Ravi Sandhu and Pierangela Samarafi, Access Control: Principles and Practice, IEEE Communications, 32(9):40-48, 1984Google ScholarDigital Library
- TivA98.TME-10 User Administration, User and Group Management Guide, Version 3.6, Tivoli Systems, Inc, 1998Google Scholar
- TivF98.TME-10 Framework Planning and Installation Guide, Version 3.6, Tivoli Systems, Inc, 1998Google Scholar
- TivS98.TME-10 Security Management User's Guide, Version 3.6, Tivoli Systems,/nc, 1998Google Scholar
Index Terms
- Migrating to role-based access control
Recommendations
Role mining - revealing business roles for security administration using data mining technology
SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologiesIn this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where large-scale customers wanted to migrate to Role-Based Access Control (RBAC) ...
Configuring role-based access control to enforce mandatory and discretionary access control policies
Access control models have traditionally included mandatory access control (or lattice-based access control) and discretionary access control. Subsequently, role-based access control has been introduced, along with claims that its mechanisms are general ...
Delegation in role-based access control
User delegation is a mechanism for assigning access rights available to one user to another user. A delegation can either be a grant or transfer operation. Existing work on delegation in the context of role-based access control models has extensively ...
Comments