skip to main content
10.1145/344287acmconferencesBook PagePublication PagessacmatConference Proceedingsconference-collections
RBAC '00: Proceedings of the fifth ACM workshop on Role-based access control
ACM2000 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
RBAC00: ACM Role-based Access Control Workshop Berlin Germany July 26 - 28, 2000
ISBN:
978-1-58113-259-5
Published:
26 July 2000
Sponsors:

Abstract

No abstract available.

Skip Table Of Content Section
Article
Free
Injecting RBAC to secure a Web-based workflow system

Web-based workflow systems have recently received much attention because they can support dynamic business processes over heterogeneous computing systems. Most existing web-based workflow systems, however, provide minimal security services such as ...

Article
Free
Application of XML tools for enterprise-wide RBAC implementation tasks

The use of Extensible Markup Language (XML) and its associated APIs, for information modeling and information interchange applications is being actively explored by the reseach community. In this paper we develop an XML Document Type Definition (DTD) ...

Article
Free
TRBAC: a temporal role-based access control model

Role-based access control (RBAC) models are receiving increasing attention as a generalized approach to access control. Roles can be active at certain time periods and non active at others; moreover, there can be activation dependencies among roles. To ...

Article
Free
Modeling users in role-based access control

The essential properties of a simple model for users, groups and group hierarchies for role-based access control, embodied in a group graph, are presented. The interaction between the group graph and the role graph model of Nyanchama and Osborn is ...

Article
Free
Role delegation in role-based access control
Article
Free
The NIST model for role-based access control: towards a unified standard

This paper describes a unified model for role-based access control (RBAC). RBAC is a proven technology for large-scale authorization. However, lack of a standard model results in uncertainty and confusion about its utility and meaning. The NIST model ...

Article
Free
Rebuttal to the NIST RBAC model proposal

In this abstract, we rebut the proposed RBAC unified reference model as defined by Sandhu, Ferriaolo, and Kuhn [4]. As a unified reference model, this proposal simply re-enforces some of the concepts that are fundamental to RBAC (i.e., roles, users, and ...

Article
Free
Role-finding/role-engineering (panel session)
Article
Free
A model of accountability, confidentiality and override for healthcare and other applications

A UML model of Authorisation is described, which was developed for an Electronic Medical Records application in collaboration with the UK NHS Information Authority. The model is an enhancement of the UK Healthcare Model (HcM), in that it provides extra ...

Article
Free
Enabling technologies for role based online decision engines

The implementation of an RBAC system at the TUB led us towards a specific meaning of role-based access control, where decisions regarding user permissions are based on online evaluations of a distributed RBAC model, we call this approach role-based ...

Article
Free
Three for one: role-based access-control management in rapidly changing heterogeneous environments

We describe a maintenance tool for role-based access-control (RBAC0, RBAC1 and RBAC2 [1]), implemented in a Swiss bank. Concept and implementation of the system is as far as possible independent of operating system and vendors. The tool supports the ...

Article
Free
Integrated constraints and inheritance in DTAC

Inheritance and constraints are two common techniques for safely managing the complexity of large access control configurations. Inheritance is used to help factor the model, while constraints are used to help ensure that the complexity will not result ...

Article
Free
Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization

In this paper we describe the work in progress with a process-oriented approach for role-finding to implement Role-Based Security Administration. Our results stem from using a recently proposed role model and procedural model at Siemens AG ICN, a large ...

Article
Free
Engineering authority and trust in cyberspace: the OM-AM and RBAC way

Information systems of the future will be large-scale, highly decentralized, pervasive, span organizational boundaries and evolve rapidly. Effective security in this cyberspace will require engineering authority and trust retationships across ...

Contributors
  • Rutgers University-Newark

Recommendations