- SAND93.Ravi S. Sandhu, "Lattice-based access control models," IEEE Computer 26(11):9-19, November 1993. Google ScholarDigital Library
- SAND94b.Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman, "Role-based access control: A multi-dimensional view," In Tenth Annual Computer Security Application Conference, pages 54-62, Orlando, FL, 5-9 December 1994.Google Scholar
- SAND96a.Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman, "Role-based access control models," IEEE Computer, 29(2):38-47, February 1996. Google ScholarDigital Library
- SAND96b.Ravi S. Sandhu, "Role hierarchies and constraints for lattice-based access controls," In Elisa Bertino, editor, Proc. European Symposium on Research in Computer Security, Springer-Verlag, Rome, Italy, 1996. To appear as Lecture Notes in Computer Science, Computer Security - ESORICS96. Google ScholarDigital Library
- THOM94.Roshan Thomas and Ravi S. Sandhu, "Conceptual foundations for a model of task-based authorizations," In IEEE Computer Security Foundations Workshop 7, pages 66-79, Franconia, NH, June 1994.Google ScholarCross Ref
Index Terms
- Rationale for the RBAC96 family of access control models
Recommendations
Configuring role-based access control to enforce mandatory and discretionary access control policies
Access control models have traditionally included mandatory access control (or lattice-based access control) and discretionary access control. Subsequently, role-based access control has been introduced, along with claims that its mechanisms are general ...
Role-Based Access Control Models
Since the 1970s, computer systems have featured multiple applications and served multiple users, leading to heightened awareness of data security issues. System administrators and software developers focused on different kinds of access control to ...
Comments