[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/266741.266752acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article
Free access

The ARBAC97 model for role-based administration of roles: preliminary description and outline

Published: 06 November 1997 Publication History
First page of PDF

References

[1]
David Ferraiolo, Janet Cugini, and Richard Kuhn. Role-based access control (RBAC): Features and motivations. In Proceedings of llth Annual Computer Security Application Conference, pages 241-48, New Orleans, LA, December 11-15 1995.]]
[2]
David Ferraiolo and Richard Kuhn. Rolebased access controls. In Proceedings of 15th NIST-NCSC National Computer Security Conference, pages 554 563, Baltimore, MD, October 13-16 1992.]]
[3]
Luigi Guiri and Pietro Iglio. A formal model for role-based access control with constraints. In Proceedings of IEEE Computer Security Foundations Workshop 9, pages 136-145, Kenmare, Ireland, June 1996.]]
[4]
Luigi Guiri. A new model for role-based access control. In Proceedings of 11th Annual Computer Security Application Conference, pages 249-255, New Orleans, LA, December 11-15 1995.]]
[5]
M.-Y. Hu, S.A. Demurjian, and T.C. Ting. User-role based security in the ADAM object-oriented design and analyses environment. In J. Biskup, M. Morgernstern, and C. Landwehr, editors, Database Security VIII: Status and Prospects. North- Holland, 1995.]]
[6]
Imtiaz Mohammed and David M. Dilts. Design for dynamic user-role-based security. Computers ~ Security, 13(8):661-671, 1994.]]
[7]
Matunda Nyanchama and Sylvia Osborn. Access rights administration in role-based security systems. In J. Biskup, M. Morgernstern, and C. Landwehr, editors, Database Security VIII: Status and Prospects. North- Holland, 1995.]]
[8]
Ravi Sandhu. Rationale for the RBAC96 family of access control models. In Proceedings of the 1st A CM Workshop on Role- Based Access Control. ACM, 1997.]]
[9]
Ravi Sandhu and Venkata Bhamidipati. Role-based administration of user-role assignment: The URA97 model and its Oracle implementation. In T. Y. Lin and Xiaolei Qian, editors, Database Security XI: Status and Prospects. North-Holland, to appear.]]
[10]
Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. Rolebased access control models. IEEE Computer, 29(2):38-47, February 1996.]]
[11]
S. H. yon Solms and Isak van der Merwe. The management of computer security profiles using a role-oriented approach. Computers ~4 Security, 13(8):673-680, 1994.]]
[12]
Charles Youman, Ed Coyne, and Ravi Sandhu, editors. Proceedings of the'. 1st A CM Workshop on Role-Based Access Control, Nov 31-Dec. 1, 1995. ACM, 1997.]]

Cited By

View all
  • (2024)Combo-Chain: Towards a hierarchical attribute-based access control system for IoT with smart contract and sharding techniqueInternet of Things10.1016/j.iot.2024.10108025(101080)Online publication date: Apr-2024
  • (2023)Achieving Privacy-preserving Arbitrary Geometric Range Query with Bilateral Access Control2023 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics)10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics60724.2023.00052(180-187)Online publication date: 17-Dec-2023
  • (2020)Blockchain Platforms and Access Control Classification for IoT SystemsSymmetry10.3390/sym1210166312:10(1663)Online publication date: 12-Oct-2020
  • Show More Cited By

Index Terms

  1. The ARBAC97 model for role-based administration of roles: preliminary description and outline

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        RBAC '97: Proceedings of the second ACM workshop on Role-based access control
        November 1997
        159 pages
        ISBN:0897919858
        DOI:10.1145/266741
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 06 November 1997

        Permissions

        Request permissions for this article.

        Check for updates

        Qualifiers

        • Article

        Conference

        RBAC97
        Sponsor:
        RBAC97: Second ACM Workshop on Role-Based Access Control
        November 6 - 7, 1997
        Virginia, Fairfax, USA

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)88
        • Downloads (Last 6 weeks)16
        Reflects downloads up to 15 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Combo-Chain: Towards a hierarchical attribute-based access control system for IoT with smart contract and sharding techniqueInternet of Things10.1016/j.iot.2024.10108025(101080)Online publication date: Apr-2024
        • (2023)Achieving Privacy-preserving Arbitrary Geometric Range Query with Bilateral Access Control2023 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics)10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics60724.2023.00052(180-187)Online publication date: 17-Dec-2023
        • (2020)Blockchain Platforms and Access Control Classification for IoT SystemsSymmetry10.3390/sym1210166312:10(1663)Online publication date: 12-Oct-2020
        • (2020)A SaaS Resource Authorization Management Model based on Resource Directed Tree2020 IEEE 9th Joint International Information Technology and Artificial Intelligence Conference (ITAIC)10.1109/ITAIC49862.2020.9338841(1747-1752)Online publication date: 11-Dec-2020
        • (2019)Secure Desktop Computing in the Cloud2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)10.1109/CSCloud/EdgeCom.2019.00-10(107-112)Online publication date: Jun-2019
        • (2016)A hierarchical Access Control model of software repository based on RBAC2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)10.1109/ICSESS.2016.7883179(761-765)Online publication date: Aug-2016
        • (2016)Developing A Secure Cloud Storage System for Storing IoT Data by Applying Role Based EncryptionProcedia Computer Science10.1016/j.procs.2016.06.00789(43-50)Online publication date: 2016
        • (2015)An analysis of graphs that represent a role-based security policy hierarchyJournal of Computer Security10.3233/JCS-15053223:5(641-657)Online publication date: 25-Sep-2015
        • (2015)Task-role-based Access Control Model in Smart Health-care SystemMATEC Web of Conferences10.1051/matecconf/2015220101122(01011)Online publication date: 9-Jul-2015
        • (2014)Enhanced Role-Based Access Control for Cloud SecurityArtificial Intelligence and Evolutionary Algorithms in Engineering Systems10.1007/978-81-322-2126-5_89(837-852)Online publication date: 2-Nov-2014
        • Show More Cited By

        View Options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media