Proceedings of ... ACM Symposium on Access Control Models and Technologies: SACMAT ..., Volume 8, Part 2003Association for Computing Machinery, 2003 - Computers |
Contents
Enterprise Role Adminstration | 3 |
Features and Case Studies | 12 |
F Ferraiolo NIST G J Ahn University of North Carolina at Charlotte | 21 |
Copyright | |
14 other sections not shown
Other editions - View all
Common terms and phrases
access control lists Access Control Models access control policies access rights ACM Transactions action activate allow applications approach ASCap client Computer Computer Security context conditions context constraints context function credentials data mining database defined delegatable delegation role delete delta distributed document domain duty constraints dynamic encrypted enforcement enterprise environment ERBAC evaluation example Ferraiolo Figure framework GTRBAC IEEE implementation Information and System inheritance middleware node objects operation paper Payroll peers Petri Nets privileges protocol r₁ r₂ RBAC model regular role relation request requirements role engineering role graph role hierarchy Role-Based Access Control rules SACMAT Sandhu scenario scope Section security policies semantics sensors separation of duty server SMTP specification static straints System Security threat level tion Transactions on Information trigger trust negotiation types Unix update user-role assignment workflow XORBAC XOTcl XPath