skip to main content
10.1145/270152.270167acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article
Free Access

Rationale for the RBAC96 family of access control models

Authors Info & Claims
Published:01 December 1996Publication History
First page image

References

  1. SAND93.Ravi S. Sandhu, "Lattice-based access control models," IEEE Computer 26(11):9-19, November 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. SAND94b.Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman, "Role-based access control: A multi-dimensional view," In Tenth Annual Computer Security Application Conference, pages 54-62, Orlando, FL, 5-9 December 1994.Google ScholarGoogle Scholar
  3. SAND96a.Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman, "Role-based access control models," IEEE Computer, 29(2):38-47, February 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. SAND96b.Ravi S. Sandhu, "Role hierarchies and constraints for lattice-based access controls," In Elisa Bertino, editor, Proc. European Symposium on Research in Computer Security, Springer-Verlag, Rome, Italy, 1996. To appear as Lecture Notes in Computer Science, Computer Security - ESORICS96. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. THOM94.Roshan Thomas and Ravi S. Sandhu, "Conceptual foundations for a model of task-based authorizations," In IEEE Computer Security Foundations Workshop 7, pages 66-79, Franconia, NH, June 1994.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Rationale for the RBAC96 family of access control models

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              RBAC '95: Proceedings of the first ACM Workshop on Role-based access control
              December 1996
              306 pages
              ISBN:0897917596
              DOI:10.1145/270152

              Copyright © 1996 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 December 1996

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader