- 【Updated on May 12, 2025】 Integration of CiNii Dissertations and CiNii Books into CiNii Research
- Trial version of CiNii Research Automatic Translation feature is available on CiNii Labs
- Suspension and deletion of data provided by Nikkei BP
- Regarding the recording of “Research Data” and “Evidence Data”
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
- Sylvia Osborn
- Univ. of Western Ontario, London, Ont., Canada
-
- Ravi Sandhu
- George Mason Univ., Fairfax, VA
-
- Qamar Munawer
- George Mason Univ., Fairfax, VA
Description
<jats:p>Access control models have traditionally included mandatory access control (or lattice-based access control) and discretionary access control. Subsequently, role-based access control has been introduced, along with claims that its mechanisms are general enough to simulate the traditional methods. In this paper we provide systematic constructions for various common forms of both of the traditional access control paradigms using the role-based access control (RBAC) models of Sandhu et al., commonly called RBAC96. We see that all of the features of the RBAC96 model are required, and that although for the manatory access control simulation, only one administrative role needs to be assumed, for the discretionary access control simulations, a complex set of administrative roles is required.</jats:p>
Journal
-
- ACM Transactions on Information and System Security
-
ACM Transactions on Information and System Security 3 (2), 85-106, 2000-05
Association for Computing Machinery (ACM)
- Tweet
Details 詳細情報について
-
- CRID
- 1360574094191858560
-
- NII Article ID
- 30022078064
-
- ISSN
- 15577406
- 10949224
-
- Data Source
-
- Crossref
- CiNii Articles