An HBAC-based approximation for IBAC programs
Abstract
References
Index Terms
- An HBAC-based approximation for IBAC programs
Recommendations
Role-based authorization constraints specification
Constraints are an important aspect of role-based access control (RBAC) and are often regarded as one of the principal motivations behind RBAC. Although the importance of contraints in RBAC has been recogni zed for a long time, they have not recieved ...
Mutual Authorizations: Semantics and Integration Issues
SACMAT '19: Proceedings of the 24th ACM Symposium on Access Control Models and TechnologiesStudies in fields like psychology and sociology have revealed that reciprocity is a powerful determinant of human behavior. None of the existing access control models however captures this reciprocity phenomenon. In this paper, we introduce a new kind ...
Reasoning about Relation Based Access Control
NSS '10: Proceedings of the 2010 Fourth International Conference on Network and System SecurityRelation Based Access Control (RelBAC) is an access control model that places permissions as first class concepts. Under this model, we discuss in this paper how to formalize typical access control policies with Description Logics. Important security ...
Comments
Information & Contributors
Information
Published In
- General Chairs:
- Atilla Elçi,
- Manoj Singh Gaur,
- Mehmet A. Orgun,
- Oleg B. Makarevich
Sponsors
- Macquarie U., Austarlia
- MNIT: Malaviya National Institute of Technology
- Aksaray Univ.: Aksaray University
- SFedU: Southern Federal University
In-Cooperation
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Short-paper
Conference
- MNIT
- Aksaray Univ.
- SFedU
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 31Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in