skip to main content
10.1145/319171.319176acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article
Free Access

The RSL99 language for role-based separation of duty constraints

Authors Info & Claims
Published:28 October 1999Publication History
First page image

References

  1. Bal90.Robert W. Baldwin. Naming and grouping privileges to simplify security management in large database. In Proceedings of IEEE Symposium on Research in Security and privacy, pages 61-70, Oakland, CA, April 1990.Google ScholarGoogle ScholarCross RefCross Ref
  2. CS95.Fang Chen and Ravi Sandhu. Constraints for role based access control. In Proceedings of 1st A CM Workshop on Role-Based Access Control, pages 39-46, Gaithersburg, MD, November 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. CW87.D.D. Clark and D. R. Wilson. A comparision of commercial and military computer security plocies. In Proceedings of IEEE Symposium on Security and Privacy, pages 184- 194, April 1987.Google ScholarGoogle ScholarCross RefCross Ref
  4. FBK99.David F. Ferraiolo, John F. Barkley, and D. Richard Kuhn. A role based access control model and reference implementation within a corporate intranet. A CM Transactions on Information and Systems Security, 2(1):34-64, February 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. FCK95.David Ferraiolo, Janet Cugini, and Richard Kuhn. Role-based access control (RBAC): Features and motivations. In Proceedings of 11th Annual Computer Security Application Conference, pages 241-48, New Orleans, LA, December 11-15 1995.Google ScholarGoogle Scholar
  6. GGF98.Virgil D. Gligor, Serban I. Gavrila, and David Ferraiolo. On the formal definition of separation-of-duty policies and their composition. In Proceedings of IEEE Symposium on Research in Security and Privacy, pages 172-183, Oakland, CA, May 1998.Google ScholarGoogle ScholarCross RefCross Ref
  7. Kuh97.D. Richard Kuhn. Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. In Proceedings of 2nd A CM Workshop on Role- Based Access Control, Fairfax, VA, October 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. NO99.Matunda Nyanchama and Sylvia Osborn. The role graph model and conflict of interest. A CM Transactions on Information and Systems Security, 2(1):3-33, February 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. NP90.M.N. Nash and K.R. Poland. Some conundrums concerning separation of duty. In Proceedings o/ IEEE Symposium on Security and Privacy, pages 201-207, Oakland, CA, May 1990.Google ScholarGoogle ScholarCross RefCross Ref
  10. San88.Ravi Sandhu. Transaction control expressions for separation of duties. In Proceedings of 4th Aerospace Computer Security Conference, pages 282-286, Orlando, FL, December 1988.Google ScholarGoogle ScholarCross RefCross Ref
  11. San93.Ravi S. Sandhu. Lattice-based access control models. IEEE Computer, 26(11):9-19, November 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. San96.Ravi S. Sandhu. Role hierarchies and constraints for lattice-based access controls. In Elisa Bertino, editor, Proc. Fourth European Symposium on Research in Computer Security. Springer-Verlag, Rome, Italy, 1996. Published as Lecture Notes in Computer Science, Computer Security-ESORICS96. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. San97.Ravi Sandhu. Rationale for the RBAC96 family of access control models. In Proceedings of the 1st A CM Workshop on Role- Based Access Control. ACM, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. SCFY96.Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. Rolebased access control models. IEEE Computer, 29(2):38-47, February 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. SZ97.R.T. Simon and M. E. Zurko. Separation of duty in role-based environments. In Proceedings of IEEE Computer Security Foundations Workshop, pages 183-194, Rockport, MA, December 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. TS94.Roshan Thomas and Ravi S. Sandhu. Conceptual foundations for a model of task-based authorizations. In Proceedings of IEEE Computer Security Foundations Workshop, pages 66-79, Franconia, NH, June 1994.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. The RSL99 language for role-based separation of duty constraints

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              RBAC '99: Proceedings of the fourth ACM workshop on Role-based access control
              October 1999
              160 pages
              ISBN:1581131801
              DOI:10.1145/319171

              Copyright © 1999 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 28 October 1999

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

              Upcoming Conference

              SACMAT 2024

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader