Cited By
View all- Lui RHui LYiu S(2005)Secure role activation and authorization in the enterprise environmentProceedings of the Second European conference on Public Key Infrastructure10.1007/11533733_2(22-35)Online publication date: 30-Jun-2005
Role-based access control (RBAC) is a widely-used protocol to design and build an access control for providing the system security regarding authorization. Even though in the context of internet resources access, the authentication and access control ...
This article presents access control from a general and a role-based perspective. The article's focus is role based Access Control from a practical vice a theoretical perspective. The article starts with some access control definitions and two secure ...
The access control model is a core aspect of trusted information systems. Based on the role based access control (RBAC) model, we put forward the concept of the homonymous role, which extends the role control categories in RBAC, balances the control ...
Springer-Verlag
Berlin, Heidelberg