[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/286884.286902acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article
Free access

Formal specification for role based access control user/role and role/role relationship management

Published: 01 October 1998 Publication History
First page of PDF

References

[1]
D. Ferraiolo, J. Cugini, and D. R. Kuhn. Role Based Access Control: Features and Motivations. In Annual Computer Security Applications Conference, IEEE Computer Society Press, 1995.
[2]
J. Barkley, A. Cincotta, D. Ferraiolo, S. Gavrila, and D.R. Kuhn. Role Based Access Control for the World Wide Web. In 20th National Information System Security Conference, NIST/NSA, 1997.
[3]
R. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. Role Based Access Control Models. IEEE Computer 29 (2), February 1996.
[4]
R. Sandhu. Role Activation Hierarchies. Proceedings of the Third ACM Workshop on Role-Based Access Control, October 1998.

Cited By

View all
  • (2022)Usevalia: Managing Inspection-Based Usability AuditsInternational Journal of Human–Computer Interaction10.1080/10447318.2022.212187940:3(719-743)Online publication date: 14-Sep-2022
  • (2020)Cryptographic framework for role control remedy: A secure role engineering mechanism for single authority organizationsFuture Generation Computer Systems10.1016/j.future.2020.10.021Online publication date: Nov-2020
  • (2020)Capability-Based Non-fungible Tokens Approach for a Decentralized AAA Framework in IoTBlockchain Cybersecurity, Trust and Privacy10.1007/978-3-030-38181-3_2(7-31)Online publication date: 3-Mar-2020
  • Show More Cited By

Index Terms

  1. Formal specification for role based access control user/role and role/role relationship management

          Recommendations

          Comments

          Please enable JavaScript to view thecomments powered by Disqus.

          Information & Contributors

          Information

          Published In

          cover image ACM Conferences
          RBAC '98: Proceedings of the third ACM workshop on Role-based access control
          October 1998
          121 pages
          ISBN:1581131135
          DOI:10.1145/286884
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Sponsors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 01 October 1998

          Permissions

          Request permissions for this article.

          Check for updates

          Qualifiers

          • Article

          Conference

          RBAC98
          Sponsor:
          RBAC98: Third ACM Workshop on Role-Based Access Control
          October 22 - 23, 1998
          Virginia, Fairfax, USA

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)166
          • Downloads (Last 6 weeks)22
          Reflects downloads up to 20 Jan 2025

          Other Metrics

          Citations

          Cited By

          View all
          • (2022)Usevalia: Managing Inspection-Based Usability AuditsInternational Journal of Human–Computer Interaction10.1080/10447318.2022.212187940:3(719-743)Online publication date: 14-Sep-2022
          • (2020)Cryptographic framework for role control remedy: A secure role engineering mechanism for single authority organizationsFuture Generation Computer Systems10.1016/j.future.2020.10.021Online publication date: Nov-2020
          • (2020)Capability-Based Non-fungible Tokens Approach for a Decentralized AAA Framework in IoTBlockchain Cybersecurity, Trust and Privacy10.1007/978-3-030-38181-3_2(7-31)Online publication date: 3-Mar-2020
          • (2019)User Access Rights Recommendation using Modified Fuzzy C-Means in Role Mining of an Indonesian Core Banking System2019 12th International Conference on Information & Communication Technology and System (ICTS)10.1109/ICTS.2019.8850977(241-245)Online publication date: Jul-2019
          • (2018)Extensible markup language keywords search based on security access controlInternational Journal of Grid and Utility Computing10.1504/IJGUC.2018.0902279:1(43-50)Online publication date: 1-Jan-2018
          • (2018)Logic programming applicationsDeclarative Logic Programming10.1145/3191315.3191326(519-548)Online publication date: 1-Sep-2018
          • (2018)Multi-user permission strategy to access sensitive informationInformation Sciences: an International Journal10.1016/j.ins.2017.09.039423:C(24-49)Online publication date: 1-Jan-2018
          • (2018)Declarative Logic ProgrammingundefinedOnline publication date: 1-Sep-2018
          • (2016)Mutual Authentication Protocol for Role-Based Access Control Using Mobile RFIDApplied Sciences10.3390/app60802156:8(215)Online publication date: 29-Jul-2016
          • (2016)Politic of security, privacy and transparency in human learning systemsEducation and Information Technologies10.1007/s10639-014-9336-621:3(521-530)Online publication date: 1-May-2016
          • Show More Cited By

          View Options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Login options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media