Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Ahn G. and Sandhu R. Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur., 3(4):207–226, 2000.
American national standard for information technology (ANSI). Role based access control. ANSI INCITS 359–2004, February 2004.
Bertino E., Bonatti P.A., and Ferrari E. TRBAC: a temporal role-based access control model. ACM Trans. Inf. Syst. Secur., 4(3):191–233, 2001.
Bertino E., Catania B., Damiani M.L., and Perlasca P. GEO-RBAC: A spatially aware RBAC. In Proc. 10th ACM Symp. on Access Control Models and Technologies, pp. 29–37.2005,
Chandran S.M. and Joshi J.B.D. LoT RBAC: a location and time-based RBAC model. In Proc. 6th Int. Conf. on Web Information Systems Eng., 2005, pp. 361–375.
Crampton J. and Loizou G. Administrative scope: a foundation for role-based administrative models. ACM Trans. Inf. Syst. Secur., 6(2):201–231, 2003.
Joshi J.B.D., Bertino E., Latif U., and Ghafoor A. A generalized temporal role-based access control model. IEEE Trans. Knowl. Data Eng., 17(1):4–23, 2005.
Joshi J.B.D., Shafiq B., Ghafoor A., and Bertino E. Dependencies and separation of duty constraints in GTRBAC. In Proc. 8th ACM Symp. on Access Control Models and Technologies, pp. 51–64.2003,
Nyanchama M. and Osborn S.L. The role graph model. In Proc. 1st ACM Workshop on Role-Based Access Control, 1995.
Osborn S., Sandhu R., and Munawer Q. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Inf. Syst. Secur., 3:85–106, 2000.
Piromruen S. and Joshi J.B.D. An RBAC framework for time constrained secure interoperation in multi-domain environment. In Proc. IEEE Workshop on Object-oriented Real-time Dependable Systems, 2005, pp. 36–45.
Sandhu R., Bhamidipati V., and Munawer Q. The ARBAC97 model for role-based administration of roles. ACM Trans. Inf. Syst. Secur., 2(1):105–135, 1999.
Sandhu R.S., Coyne E.J., Feinstein H.L., and Youman C.E. Role-based access control models. IEEE Comput., 29(2):38–47, 1996.
Shafiq B., Joshi J.B.D., Bertino E., and Ghafoor A. Secure interoperation in a multi-domain environment employing RBAC policies. IEEE Trans. Knowl. Data Eng., 17(11):1557–1577, 2005.
Zhang L., Ahn G., and Chu B. A role-based delegation framework for healthcare information systems. In Proc. 7th ACM Symp. on Access Control Models and Technologies, pp. 125–134.2002,
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer Science+Business Media, LLC
About this entry
Cite this entry
Zhang, Y., Joshi, J.B. (2009). Role Based Access Control. In: LIU, L., ÖZSU, M.T. (eds) Encyclopedia of Database Systems. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-39940-9_320
Download citation
DOI: https://doi.org/10.1007/978-0-387-39940-9_320
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-35544-3
Online ISBN: 978-0-387-39940-9
eBook Packages: Computer ScienceReference Module Computer Science and Engineering