skip to main content
10.1145/286884.286893acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article
Free Access

How to do discretionary access control using roles

Authors Info & Claims
Published:01 October 1998Publication History
First page image

References

  1. GD72.G.S. Graham and P.j. Denning. Protection - principles and practice. In AFIPS Spring Joint Computer Conference, pages 40:417- 429, 1972.Google ScholarGoogle Scholar
  2. HRU76.M.H. Harrison, W.L. Ruzzo, and J.D. Ullman. Protection in operating systems. Communications of the A CM, 19(8):461-471, 1976. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Lam71.B.W. Lampson. Protection. In 5th Princeton Symposium on information Science and Systems, pages 437-443, 1971. Reprinted in A CM Operating Systems Review 8(1):18-24, 1974. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. NO96.Matunda Nyanchama and Sylvia Osborn. Modeling mandatory access control in rolebased security systems. In Database Security VIII: Status and Prospects. Chapman-Hall, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. San88.Ravi S. Sandh~l. The schematic protection model: Its definition and analysis for acyclic attenuating schemes. Journal o} the A CM, 35(2):404-432, April 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. San92.Ravi S. Sandhu. The typed access matrix model. In Proceedings o} IEEE Symposium on Research in Security and Privacy, pages 122-136, Oakland~ CA, May 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. San93.Ravi S. Sandhu. Lattice-based access control models. IEEE Computer, 26(11):9-19, November 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. San96.Ravi S. Saudhu. Role hierarchies and constraints for lattice-based access controls. In Elisa Bertino, editor, Proc. Fourth European Symposium on Research in Computer Security. Springer-Verlag, Rome, Italy, 1996. Published as Lecture Notes in Computer Science, Computer Security-ESORICS96. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. San97.Ravi Sandhu. Rationale for the RBAC96 family of access control models. In Proceedings of the 1st A CM Workshop on Role- Based Access Control. ACM, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. SCFY96.Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. Rolebased access control models. IEEE Computer, 29(2):38-47, February 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. SS94.Ravi Sandhu and Pierangela Samarati. Access control: Principles and practice. IEEE Communications, 32(9):40-48, 1994.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. SS97.Ravi S. Sandhu and Pieran~ela Samarati. Authentication, access control and intrusion detection. In Allen B. Tucker, editor, The Computer Science and Engineering Handbook, pages 1929-1948. CRC Press, 1997.Google ScholarGoogle Scholar

Index Terms

  1. How to do discretionary access control using roles

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              RBAC '98: Proceedings of the third ACM workshop on Role-based access control
              October 1998
              121 pages
              ISBN:1581131135
              DOI:10.1145/286884

              Copyright © 1998 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 October 1998

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

              Upcoming Conference

              SACMAT 2024

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader