[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/319171.319176acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article
Free access

The RSL99 language for role-based separation of duty constraints

Published: 28 October 1999 Publication History
First page of PDF

References

[1]
Robert W. Baldwin. Naming and grouping privileges to simplify security management in large database. In Proceedings of IEEE Symposium on Research in Security and privacy, pages 61-70, Oakland, CA, April 1990.
[2]
Fang Chen and Ravi Sandhu. Constraints for role based access control. In Proceedings of 1st A CM Workshop on Role-Based Access Control, pages 39-46, Gaithersburg, MD, November 1995.
[3]
D.D. Clark and D. R. Wilson. A comparision of commercial and military computer security plocies. In Proceedings of IEEE Symposium on Security and Privacy, pages 184- 194, April 1987.
[4]
David F. Ferraiolo, John F. Barkley, and D. Richard Kuhn. A role based access control model and reference implementation within a corporate intranet. A CM Transactions on Information and Systems Security, 2(1):34-64, February 1999.
[5]
David Ferraiolo, Janet Cugini, and Richard Kuhn. Role-based access control (RBAC): Features and motivations. In Proceedings of 11th Annual Computer Security Application Conference, pages 241-48, New Orleans, LA, December 11-15 1995.
[6]
Virgil D. Gligor, Serban I. Gavrila, and David Ferraiolo. On the formal definition of separation-of-duty policies and their composition. In Proceedings of IEEE Symposium on Research in Security and Privacy, pages 172-183, Oakland, CA, May 1998.
[7]
D. Richard Kuhn. Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. In Proceedings of 2nd A CM Workshop on Role- Based Access Control, Fairfax, VA, October 1997.
[8]
Matunda Nyanchama and Sylvia Osborn. The role graph model and conflict of interest. A CM Transactions on Information and Systems Security, 2(1):3-33, February 1999.
[9]
M.N. Nash and K.R. Poland. Some conundrums concerning separation of duty. In Proceedings o/ IEEE Symposium on Security and Privacy, pages 201-207, Oakland, CA, May 1990.
[10]
Ravi Sandhu. Transaction control expressions for separation of duties. In Proceedings of 4th Aerospace Computer Security Conference, pages 282-286, Orlando, FL, December 1988.
[11]
Ravi S. Sandhu. Lattice-based access control models. IEEE Computer, 26(11):9-19, November 1993.
[12]
Ravi S. Sandhu. Role hierarchies and constraints for lattice-based access controls. In Elisa Bertino, editor, Proc. Fourth European Symposium on Research in Computer Security. Springer-Verlag, Rome, Italy, 1996. Published as Lecture Notes in Computer Science, Computer Security-ESORICS96.
[13]
Ravi Sandhu. Rationale for the RBAC96 family of access control models. In Proceedings of the 1st A CM Workshop on Role- Based Access Control. ACM, 1997.
[14]
Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. Rolebased access control models. IEEE Computer, 29(2):38-47, February 1996.
[15]
R.T. Simon and M. E. Zurko. Separation of duty in role-based environments. In Proceedings of IEEE Computer Security Foundations Workshop, pages 183-194, Rockport, MA, December 1997.
[16]
Roshan Thomas and Ravi S. Sandhu. Conceptual foundations for a model of task-based authorizations. In Proceedings of IEEE Computer Security Foundations Workshop, pages 66-79, Franconia, NH, June 1994.

Cited By

View all
  • (2023)A Robust Approach for the Detection and Prevention of Conflicts in I2NSF Security PoliciesNOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium10.1109/NOMS56928.2023.10154304(1-7)Online publication date: 8-May-2023
  • (2020)Using RBAC to Secure Payment Process in CloudAccess Control Management in Cloud Environments10.1007/978-3-030-31729-4_6(117-138)Online publication date: 30-Sep-2020
  • (2019)Towards Effective Verification of Multi-Model Access Control PropertiesProceedings of the 24th ACM Symposium on Access Control Models and Technologies10.1145/3322431.3325105(149-160)Online publication date: 28-May-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
RBAC '99: Proceedings of the fourth ACM workshop on Role-based access control
October 1999
160 pages
ISBN:1581131801
DOI:10.1145/319171
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 October 1999

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

RBAC99
Sponsor:
RBAC99: Fourth ACM Workshop on Role-Based Access Control
October 28 - 29, 1999
Virginia, Fairfax, USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)42
  • Downloads (Last 6 weeks)5
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)A Robust Approach for the Detection and Prevention of Conflicts in I2NSF Security PoliciesNOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium10.1109/NOMS56928.2023.10154304(1-7)Online publication date: 8-May-2023
  • (2020)Using RBAC to Secure Payment Process in CloudAccess Control Management in Cloud Environments10.1007/978-3-030-31729-4_6(117-138)Online publication date: 30-Sep-2020
  • (2019)Towards Effective Verification of Multi-Model Access Control PropertiesProceedings of the 24th ACM Symposium on Access Control Models and Technologies10.1145/3322431.3325105(149-160)Online publication date: 28-May-2019
  • (2019)Representing cloud security and privacy policies and detecting potential problems2019 IEEE 5th International Conference on Big Data Intelligence and Computing (DATACOM)10.1109/DataCom.2019.00040(214-221)Online publication date: 18-Nov-2019
  • (2018)Business Process SecurityBusiness Process Management10.4324/9781315646749-8(157-181)Online publication date: 2-Feb-2018
  • (2016)Optimistic Access Control for Collaborative ApplicationsInnovative Solutions for Access Control Management10.4018/978-1-5225-0448-1.ch005(125-158)Online publication date: 2016
  • (2016)Interoperability of Relationship- and Role-Based Access ControlProceedings of the Sixth ACM Conference on Data and Application Security and Privacy10.1145/2857705.2857706(231-242)Online publication date: 9-Mar-2016
  • (2016)Event models from policy descriptions2016 2nd International Conference on Next Generation Computing Technologies (NGCT)10.1109/NGCT.2016.7877429(283-290)Online publication date: Oct-2016
  • (2015)Analyzing First-Order Role Based Access ControlProceedings of the 2015 IEEE 28th Computer Security Foundations Symposium10.1109/CSF.2015.8(3-17)Online publication date: 13-Jul-2015
  • (2014)Policy-Based Governance of Complex Distributed Systems: What Past Trends Can Teach Us about Future RequirementsAdaptive, Dynamic, and Resilient Systems10.1201/b17131-21(273-298)Online publication date: 23-Jun-2014
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media