Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleNovember 2013
Smart Phone System Security Based on Authorization Management
MINES '13: Proceedings of the 2013 Fifth International Conference on Multimedia Information Networking and SecurityPages 527–529With the booming of smart phone, smart phone system security becomes an import topic in both academic study and industrial practice. The primary way to secure a system is to avoid illegal access to resources such as file, application, phone call history ...
- research-articleAugust 2012
Context-based distribution of points of interest
MobiArch '12: Proceedings of the seventh ACM international workshop on Mobility in the evolving internet architecturePages 37–40https://doi.org/10.1145/2348676.2348686Location Based Services are a wide spread service family available at each mobile platform. One occurrence comprise services that allows users to find restaurants, hotels, sights, ATMs, gas stations, etc., i.e. points of interest (POIs). The next ...
- ArticleNovember 2010
OpenPMF SCaaS: Authorization as a Service for Cloud & SOA Applications
CLOUDCOM '10: Proceedings of the 2010 IEEE Second International Conference on Cloud Computing Technology and SciencePages 634–643https://doi.org/10.1109/CloudCom.2010.13This paper introduces the concept of moving security and compliance policy automation for Cloud applications and mashups into the Cloud. The policy automation aspects covered in this paper include policy configuration, technical policy generation using ...
- research-articleNovember 2007
A Critique of the ANSI Standard on Role-Based Access Control
IEEE Security and Privacy (IEEE-SEC-PRIVACY), Volume 5, Issue 6Pages 41–49https://doi.org/10.1109/MSP.2007.158Vendors have widely adopted RBAC to manage user access to computer resources in various products, including database management systems. However, as this analysis shows, the standard is hindered by limitations, errors, and design flaws.
- articleNovember 2004
Role-based authorizations for workflow systems in support of task-based separation of duty
Journal of Systems and Software (JSSO), Volume 73, Issue 3Pages 375–387https://doi.org/10.1016/S0164-1212(03)00175-4Role-based authorizations for assigning tasks of workflows to roles/users are crucial to security management in workflow management systems. The authorizations must enforce separation of duty (SoD) constraints to prevent fraud and errors. This work ...
- ArticleJune 2003
The role control center: features and case studies
SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologiesPages 12–20https://doi.org/10.1145/775412.775415Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of products called Enterprise Security Management Systems (ESMS). ESMS products ...
- articleMay 2003
Access control with IBM Tivoli access manager
ACM Transactions on Information and System Security (TISSEC), Volume 6, Issue 2Pages 232–257https://doi.org/10.1145/762476.762479Web presence has become a key consideration for the majority of companies and other organizations. Besides being an essential information delivery tool, the Web is increasingly being regarded as an extension of the organization itself, directly ...
- articleAugust 2001
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC), Volume 4, Issue 3Pages 224–274https://doi.org/10.1145/501978.501980In this article we propose a standard for role-based access control (RBAC). Although RBAC models have received broad support as a generalized approach to access control, and are well recognized for their many advantages in performing large-scale ...
- articleFebruary 1999
The ARBAC97 model for role-based administration of roles
ACM Transactions on Information and System Security (TISSEC), Volume 2, Issue 1Pages 105–135https://doi.org/10.1145/300830.300839In role-based access control (RBAC), permissions are associated with roles' and users are made members of roles, thereby acquiring the roles; permissions. RBAC's motivation is to simplify administration of authorizations. An appealing possibility is to ...
- articleFebruary 1999
A role-based access control model and reference implementation within a corporate intranet
ACM Transactions on Information and System Security (TISSEC), Volume 2, Issue 1Pages 34–64https://doi.org/10.1145/300830.300834This paper describes NIST's enhanced RBAC model and our approach to designing and implementing RBAC features for networked Web servers. The RBAC model formalized in this paper is based on the properties that were first described in Ferraiolo and Kuhn [...