Detailing access control mechanisms that are emerging with the latest Internet programming technologies, this thorough text provides an introduction to the foundations of programming systems security, identity management, trust models, and much more.
Cited By
- Wallis K, Merzinger M, Reich C and Schindelhauer C A Security Model based Authorization Concept for OPC Unified Architecture Proceedings of the 10th International Conference on Advances in Information Technology, (1-8)
- Ultra J and Pancho-Festin S (2017). A simple model of separation of duty for access control models, Computers and Security, 68:C, (69-80), Online publication date: 1-Jul-2017.
- Martínez S, García J and Cabot J Runtime support for rule-based access-control evaluation through model-transformation Proceedings of the 2016 ACM SIGPLAN International Conference on Software Language Engineering, (57-69)
- dos Santos D, Marinho R, Schmitt G, Westphall C and Westphall C (2016). A framework and risk assessment approaches for risk-based access control in the cloud, Journal of Network and Computer Applications, 74:C, (86-97), Online publication date: 1-Oct-2016.
- Schreuders Z, McGill T and Payne C (2013). The state of the art of application restrictions and sandboxes, Computers and Security, 32:C, (219-241), Online publication date: 1-Feb-2013.
- Gouglidis A and Mavridis I (2019). domRBAC, Computers and Security, 31:4, (540-556), Online publication date: 1-Jun-2012.
- Elabidi A, Ben Ayed G, Mettali Gammar S and Kamoun F Towards hiding federated digital identity Proceedings of the 4th international conference on Security of information and networks, (239-242)
- Zhou G, Demirer M, Bayrak C and Wang L (2011). Enable delegation for RBAC with Secure Authorization Certificate, Computers and Security, 30:8, (780-790), Online publication date: 1-Nov-2011.
- Mustafić T, Messerman A, Camtepe S, Schmidt A and Albayrak S Behavioral biometrics for persistent single sign-on Proceedings of the 7th ACM workshop on Digital identity management, (73-82)
- Gouglidis A and Mavridis I Role-based secure inter-operation and resource usage management in mobile grid systems Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication, (38-53)
- Pavlovic D Quantifying and qualifying trust Proceedings of the 7th International conference on Formal aspects of security and trust, (1-17)
- Candido S and Hutchinson S Detecting intrusion faults in remotely controlled systems Proceedings of the 2009 conference on American Control Conference, (4968-4973)
- Pavlovic D Dynamics, Robustness and Fragility of Trust Formal Aspects in Security and Trust, (97-113)
- Ajayi O, Sinnott R and Stell A Dynamic trust negotiation for flexible e-health collaborations Proceedings of the 15th ACM Mardi Gras conference: From lightweight mash-ups to lambda grids: Understanding the spectrum of distributed computing requirements, applications, tools, infrastructures, interoperability, and the incremental adoption of key capabilities, (1-7)
- Gadelha L and Schulze B On the management of grid credentials Proceedings of the 5th international workshop on Middleware for grid computing: held at the ACM/IFIP/USENIX 8th International Middleware Conference, (1-6)
- Ali B, Villegas W and Maheswaran M A trust based approach for protecting user data in social networks Proceedings of the 2007 conference of the center for advanced studies on Collaborative research, (288-293)
- Pham Q, McCullagh A and Dawson E Consistency of user attribute in federated systems Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business, (165-177)
Index Terms
- Access Control Systems: Security, Identity Management and Trust Models
Recommendations
Configuring role-based access control to enforce mandatory and discretionary access control policies
Access control models have traditionally included mandatory access control (or lattice-based access control) and discretionary access control. Subsequently, role-based access control has been introduced, along with claims that its mechanisms are general ...
Role-Based Access Control Models
Since the 1970s, computer systems have featured multiple applications and served multiple users, leading to heightened awareness of data security issues. System administrators and software developers focused on different kinds of access control to ...
Delegation in role-based access control
User delegation is a mechanism for assigning access rights available to one user to another user. A delegation can either be a grant or transfer operation. Existing work on delegation in the context of role-based access control models has extensively ...