skip to main content
10.1145/319171.319177acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article
Free Access

Supporting relationships in access control using role based access control

Published:28 October 1999Publication History
First page image

References

  1. 1.K. Beznosov, Requirements for Access Control: US Healthcare Domain. In Third ACM Workshop on Role-Based Access Control, October 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.N.Adam, V.Atluri, E.Bertino and E.Ferrari, A Content-based Authorization Model for Digital Libraries, TR 98-104, CIMIC and MSIS Department, Rutgers University, 1998.Google ScholarGoogle Scholar
  3. 3.Resource Access Decision (RAD), Object Management Group Healthcare Domain Task Force, Revised Submission, OMG TC Document corbamed/99-04-04, April 26, 1999.Google ScholarGoogle Scholar
  4. 4.D. Ferraiolo, J. Barkley, and R. Kuhn. A Role Based Access Control Model and Reference Implementation within a Corporate Intranet. ACM Transactions on Information Systems Security, Volume 1, Number 2, February 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.R. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. Role Based Access Control Models. IEEE Computer, 29(2), February 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.K. North. Web Databases: Fun with Guests or Risky Business? Web Techniques, March 1999.Google ScholarGoogle Scholar
  7. 7.R. A. Elmasri, S. B. Navathe, Fundamentals of Database Systems, Benjamin-Cummings Publishing Company, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.Eriksson, A., Penker M., UML Toolkit. John Wiley & Sons. 1998 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.State of Florida Statutes. Hospital Licensing and Regulation, Chapter 395. 1998Google ScholarGoogle Scholar
  10. 10.E.C. Lupu, M.S. Sloman, A Policy Based Role Object Model, First International Enterprise Distributed Object Computing Workshop, EDOC'97, Queensland, Australia, October 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.E. Gamma, R. Helm, R. Johnson, and J. Vlissides. Design Patterns: Elements of Reusable Object- Oriented Software. Addison-Wesley, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.Butler Lampson. Protection. In 5th Princeton Symposium on information Science and Systems, pages 437-443, 1971.Google ScholarGoogle Scholar
  13. 13.F. Chen, R. Sandhu, Constraints for Role-Based Access Control, First ACM Workshop on Role-Based Access Control, Gaithersburg MD, November 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14.L. Giuri, P. Iglio, Role Templates for Content-Based Access Control, Second ACM Workshop on Role- Based Access Control, Fairfax Virginia, November 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15.J. BarNey, Implementing Role-Based Access Control Using Object Technology, First ACM Workshop on Role-Based Access Control, Gaithersburg MD, November 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Supporting relationships in access control using role based access control

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          RBAC '99: Proceedings of the fourth ACM workshop on Role-based access control
          October 1999
          160 pages
          ISBN:1581131801
          DOI:10.1145/319171

          Copyright © 1999 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 28 October 1999

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader