[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/784590.784710guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

The ARBAC99 Model for Administration of Roles

Published: 06 December 1999 Publication History

Abstract

Role-Based Access Control (RBAC) is a flexible and policy-neutral access control technology. For large systems|with hundreds of roles, thousands of users and millions of permissions|managing roles, users, permissions and their interrelationships is a formidable task that cannot realistically be centralized in a small team of security administrators. An appealing possibility is to use RBAC itself to facilitate decentralized administration of RBAC. The ARBAC97 (administrative RBAC '97)model was recently introduced for this purpose. ARBAC97 has three sub-models called URA97 (for user-role administration), PRA97 (for permission-role administration) and RRA97 (for role-role administration). In this paper we define enhancements to ARBAC97 to give us the new ARBAC99 model. Specifically the URA and PRA sub-models of ARBAC99 introduce significant new features relative to their counterparts in ARBAC97 (while RRA is left unchanged). ARBAC99 incorporates the concept of mobile and immobile users and permissions for the first time in this arena. This paper gives a formal definition of ARBAC99, motivates these enhancements and analyzes several subtle issues that arise in this context.

Cited By

View all
  • (2016)POSTERProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security10.1145/2976749.2989068(1802-1804)Online publication date: 24-Oct-2016
  • (2016)Start HereProceedings of the 21st ACM on Symposium on Access Control Models and Technologies10.1145/2914642.2914651(113-124)Online publication date: 6-Jun-2016
  • (2016)Injecting Subject Policy into Access Control for Strengthening the Protection of Personal InformationWireless Personal Communications: An International Journal10.1007/s11277-015-3094-789:3(715-728)Online publication date: 1-Aug-2016
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
ACSAC '99: Proceedings of the 15th Annual Computer Security Applications Conference
December 1999
ISBN:0769503462

Publisher

IEEE Computer Society

United States

Publication History

Published: 06 December 1999

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2016)POSTERProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security10.1145/2976749.2989068(1802-1804)Online publication date: 24-Oct-2016
  • (2016)Start HereProceedings of the 21st ACM on Symposium on Access Control Models and Technologies10.1145/2914642.2914651(113-124)Online publication date: 6-Jun-2016
  • (2016)Injecting Subject Policy into Access Control for Strengthening the Protection of Personal InformationWireless Personal Communications: An International Journal10.1007/s11277-015-3094-789:3(715-728)Online publication date: 1-Aug-2016
  • (2015)Towards Managed Role ExplosionProceedings of the 2015 New Security Paradigms Workshop10.1145/2841113.2841121(100-111)Online publication date: 8-Sep-2015
  • (2015)SPAProceedings of the 20th ACM Symposium on Access Control Models and Technologies10.1145/2752952.2752974(221-231)Online publication date: 1-Jun-2015
  • (2013)An Administrative Model for Spatio-Temporal Role Based Access ControlProceedings of the 9th International Conference on Information Systems Security - Volume 830310.1007/978-3-642-45204-8_28(375-389)Online publication date: 16-Dec-2013
  • (2013)Policy analysis for self-administrated role-based access controlProceedings of the 19th international conference on Tools and Algorithms for the Construction and Analysis of Systems10.1007/978-3-642-36742-7_30(432-447)Online publication date: 16-Mar-2013
  • (2011)Reasoning about dynamic delegation in role based access control systemsProceedings of the 16th international conference on Database systems for advanced applications - Volume Part I10.5555/1997305.1997330(239-253)Online publication date: 22-Apr-2011
  • (2011)Program synthesis in administration of higher-order permissionsProceedings of the 16th ACM symposium on Access control models and technologies10.1145/1998441.1998449(41-50)Online publication date: 15-Jun-2011
  • (2011)Roles in information security - A survey and classification of the research areaComputers and Security10.1016/j.cose.2011.08.00230:8(748-769)Online publication date: 1-Nov-2011
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media