- 1.K. Beznosov, Requirements for Access Control: US Healthcare Domain. In Third ACM Workshop on Role-Based Access Control, October 1998. Google ScholarDigital Library
- 2.N.Adam, V.Atluri, E.Bertino and E.Ferrari, A Content-based Authorization Model for Digital Libraries, TR 98-104, CIMIC and MSIS Department, Rutgers University, 1998.Google Scholar
- 3.Resource Access Decision (RAD), Object Management Group Healthcare Domain Task Force, Revised Submission, OMG TC Document corbamed/99-04-04, April 26, 1999.Google Scholar
- 4.D. Ferraiolo, J. Barkley, and R. Kuhn. A Role Based Access Control Model and Reference Implementation within a Corporate Intranet. ACM Transactions on Information Systems Security, Volume 1, Number 2, February 1999. Google ScholarDigital Library
- 5.R. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. Role Based Access Control Models. IEEE Computer, 29(2), February 1996. Google ScholarDigital Library
- 6.K. North. Web Databases: Fun with Guests or Risky Business? Web Techniques, March 1999.Google Scholar
- 7.R. A. Elmasri, S. B. Navathe, Fundamentals of Database Systems, Benjamin-Cummings Publishing Company, 1993. Google ScholarDigital Library
- 8.Eriksson, A., Penker M., UML Toolkit. John Wiley & Sons. 1998 Google ScholarDigital Library
- 9.State of Florida Statutes. Hospital Licensing and Regulation, Chapter 395. 1998Google Scholar
- 10.E.C. Lupu, M.S. Sloman, A Policy Based Role Object Model, First International Enterprise Distributed Object Computing Workshop, EDOC'97, Queensland, Australia, October 1997. Google ScholarDigital Library
- 11.E. Gamma, R. Helm, R. Johnson, and J. Vlissides. Design Patterns: Elements of Reusable Object- Oriented Software. Addison-Wesley, 1995. Google ScholarDigital Library
- 12.Butler Lampson. Protection. In 5th Princeton Symposium on information Science and Systems, pages 437-443, 1971.Google Scholar
- 13.F. Chen, R. Sandhu, Constraints for Role-Based Access Control, First ACM Workshop on Role-Based Access Control, Gaithersburg MD, November 1995. Google ScholarDigital Library
- 14.L. Giuri, P. Iglio, Role Templates for Content-Based Access Control, Second ACM Workshop on Role- Based Access Control, Fairfax Virginia, November 1997. Google ScholarDigital Library
- 15.J. BarNey, Implementing Role-Based Access Control Using Object Technology, First ACM Workshop on Role-Based Access Control, Gaithersburg MD, November 1995. Google ScholarDigital Library
Index Terms
- Supporting relationships in access control using role based access control
Recommendations
Configuring role-based access control to enforce mandatory and discretionary access control policies
Access control models have traditionally included mandatory access control (or lattice-based access control) and discretionary access control. Subsequently, role-based access control has been introduced, along with claims that its mechanisms are general ...
Role-Based Access Control Models
Since the 1970s, computer systems have featured multiple applications and served multiple users, leading to heightened awareness of data security issues. System administrators and software developers focused on different kinds of access control to ...
Delegation in role-based access control
User delegation is a mechanism for assigning access rights available to one user to another user. A delegation can either be a grant or transfer operation. Existing work on delegation in the context of role-based access control models has extensively ...
Comments