Role Based Access Control
|
|
|
- Gloria May
- 10 years ago
- Views:
Transcription
1 Role Based Access Control Role-Based Access Control Models. By R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, IEEE Computer, vol 29(2):38--47, February The most cited paper in access control! RBAC96 Family of Models RBAC3: Role Hierarchies + Constraints RBAC1: Role Hierarchies RBAC2: Constraints RBAC0: BASIC RBAC 1
2 RBAC0 RBAC0: Formal Model U, R, P, S (users, roles, permissions, and sessions) PA P R (permission assignment) UA U R (user assignment) user: S 9 U roles: S 9 2 R requires roles(s) { r (user(s), r) UA } Session s has permissions r roles(s) { p (p, r) PA } 2
3 Why RBAC Fewer relationships to manage from O(mn) to O(m+n), where m is the number of users and n is the number of permissions Roles add a useful level of indirection RBAC? DAC? MAC? RBAC1: RBAC0+ Role Hierarchies 3
4 RBAC1: Formal Model U, R, P, S, PA, UA, and users unchanged from RBAC0 RH R R: a partial order on R, written as #; r1#r2 means that all privileges of r2 are also of r1 and all users of r1 are also of r2. roles: S 9 2 R requires roles (s) { r r [(r F r) & (user(s), r ) UA] } u is said to be authorized for role r, if u 9 + r Session s has permissions r roles(s) { p r [(r # r ) & (p, r ) PA] } Inheritance Relation 9 defines both the permission inheritance and membership inheritance. The roles toward top of the hierarchy represents more powerful roles, and the roles toward the bottom represent the more general rules. r1r2; iff all permissions of r2 are also permissions of r2 and all users of r1 are also users of r2. By 9 *, the reflexive-transitive closure of the inheritance relation (r 1 9 * r 2 iff r 1 =q 1.q n =r 2 ) is denoted. 4
5 RH ROLES x ROLES is a partial order on ROLES, where r 1 F r 2 authorized_permissions(r 2 ) authorized_permissions (r 1 ) authorized_users(r 1 ) authorized_users(r 2 ) authorized_users(r: ROLES)92 USERS, authorized_users(r) = {u USERS r F r (u, r ) UA } Is this correct?? authorized-permissions (r: ROLES) 92 PRMS authorized-permissions (r) = {p PRMS r F r (p, r ) PA } Semantics of Role Hierarchies User inheritance r 1 Fr 2 means every user that is a member of r 1 is also a member of r 2 Permission inheritance r 1 F r 2 means every permission that is authorized for r 2 is also authorized for r 1 Activation inheritance r 1 F r 2 means that activating r 1 will also activate r 2 5
6 RBAC2: RBAC0 + Constraints No formal model specified A list of examples are given Static Mutual Exclusion Constraints Two mutually exclusive roles: cannot both have the same user as members Two mutually exclusive roles: cannot both have the same permissions why? Two mutually exclusive permissions: one role cannot have both permissions why? 6
7 Cardinality Constraints On User-Role Assignment at most k users can belong to the role at least k users must belong to the role exactly k users must belong to the role On activation at most k users can activate a role Why Using Constraints? For laying out higher level organization policy simply a convenience when admin is centralized a tool to enforce high-level policies when admin is decentralized 7
8 RBAC3 RBAC3 = RBAC0 + Role Hierarchies + Constraints Some Issues in RBAC 1- Whether to Allow Multiple Roles to be Activated? RBAC96 allows it Some other does not allow! Observations: one can define new role to achieve the effect of activating multiple roles dynamic constraints are implicit when only one role can be activated in a session 8
9 2- What is a Role? A set of users A set of permissions (named protection domains) A set of users and permissions Also affects how to interpret role hierarchies Maybe it is useful to have both roles and groups? Roles vs. Groups What are the differences? Answer 1: groups are sets of users, and roles are sets of users as well as permissions doesn t seem to be true. Answer 2: one can activate and deactivate roles, but cannot deactivate groups seems unimportant unless there is negative authorization Answer 3: one can enumerate permissions that a role has seems an implementation issue 9
10 Everything as an attribute? Some attributes are more intrinsic ( TUVW) about properties of a user Some attributes are more intrinsic about job functionalities The NIST Standard Proposed NIST Standard for Role-Based Access Control. David F. Ferraiolo, Ravi S. Sandhu, Serban I. Gavrila, D. Richard Kuhn, and Ramaswamy Chandramouli. TISSEC, August ANSI Standard 10
11 Overview of the NIST Standard for RBAC Core RBAC (1) 11
12 Core RBAC (2) Core RBAC (3) 12
13 Hierarchical RBAC: Generalized Role Hierarchies Hierarchical RBAC: Limited Role Hierarchies Role Hierarchies with the limitation that each role has at most one immediate senior Role hierarchies form a forest 13
14 Constrained RBAC: Motivations Example of SoD The following duties shall be performed by different individuals: 1. Check request reviewer 2. Check preparer 3. Check issuer 4. Check deliverer 5. Ledger reviewer Constrained RBAC: Static SoD SSD (2 ROLES N) is a collection of pairs (rs,n) rs: a role set n: n F 2 is a natural number For each (rs, n), no user is authorized for n or more roles in rs 14
15 SoD with Role Hierarchies Two roles can be mutually exclusive only if neither one inherits the other If two roles are mutually exclusive, no role can inherit from both If two roles are mutually exclusive, there can be no root or super user. Constrained RBAC: Dynamic SoD DSD (2 ROLES N) is a collection of pairs (rs,n) rs: a role set n: n F 2 is a natural number For each (rs, n), no user is allowed to activate n or more roles in rs in one session 15
16 Constraints in Role Based Access Control SoD If a sensitive task comprises two steps, then two different users should perform each step. e.g. the same user cannot order goods, and authorize payment for those goods. SoD is a security principle that is generally considered to be useful. 16
17 SoD (contd.) More elaborate example: (a) Order goods and record details of order (b) Receive invoice and check against order (c) Receive goods and check against invoice (d) Authorize payment against invoice A set of SoD requirements: (1) No user performs (a) and (d). (2) At least 3 users to perform all 4 steps. Enforcement of SoD Static enforcement the permissions to perform two steps are not assigned to a single user Dynamic enforcement remember which user performed each step, and don t allow a user to perform the next step if violating SoD policy 17
18 SoD and RBAC SSoD Safety An RBAC state is given by <UA, PA, RH> Definition: An RBAC state is safe wrt. ssod({p 1,, p n },k) iff in, no k-1 users together have all permissions in {p 1,, p n }. Definition: An RBAC state is safe wrt. a set E of SSoD policies iff is safe wrt. each e in E. Definition: The SCSSoD (Safety Checking problem for SSOD) problem is to determine whether an RBAC state is safe wrt. a set E of SSoD policies. 18
19 SMER Constraints Statically mutually-exclusive role (SMER) constraints: smer({r 1,, r m }, t) means that no user can be a member of t roles from {r 1,, r m } smer({r 1,r 2 }, 2} means that r1 and r2 are mutually exclusive, i.e., no user can be a member of both roles Example: C = {c 1, c 2, c 3 }, where: c 1 = smer ({Warehouse, Accounting, Finance}, 2) c 2 = smer ({Engineering, Finance}, 2) c 3 = smer ({Quality, Finance}, 2) The ARBAC97 model for rolebased administration of roles Goal: Decentralize the administration of RBAC, i.e., allowing others to change parts of (UA,PA,RH) Overview there exist a set of administrative roles (in the RBAC terminology) that are disjoint from the regular roles 19
20 Role Hierarchy Roles Permissions Sessions Users Constraints Admin Roles Admin Role Hierarchy Admin Perms. 3 components: ARBAC97 URA97 (User-Role-Assignment) PRA97 (Permission-Role-Assignment) RRA97 (Role-Role Assignment) 20
21 The URA97 Component Prerequisite condition e.g., r1(r2 r3) is such a condition can_assign e.g., can_assign (a, cond, {r4,r5,r6}), a is an administrative role:: all users in the admin role can assign users who pass the condition cond into the role set. can_revoke e.g., can_revoke (a, {r4,r5}) weak revocation vs. strong revocation PRA97 Treat permission assignment as dual to user assignment can_assign e.g., can_assign (a, cond, {r4,r5,r6}) can_revoke e.g., can_revoke (a, {r4,r5}) 21
22 RRA 22
Role-based access control. RBAC: Motivations
Role-based access control 1 RBAC: Motivations Complexity of security administration For large number of subjects and objects, the number of authorizations can become extremely large For dynamic user population,
Role Based Access Control (RBAC) Nicola Zannone
Role Based Access Control (RBAC) Nicola Zannone 1 DAC and MAC Discretionary Access Control (DAC) Access control determined by the owner of an object Oner can delegate access rights to other users Access
A Critique of the ANSI Standard on Role Based Access Control
A Critique of the ANSI Standard on Role Based Access Control Ninghui Li Ji-Won Byun Elisa Bertino CERIAS and Department of Computer Science Purdue University 656 Oval Drive, West Lafayette, IN 47907-2086
Proposed NIST Standard for Role-Based Access Control
Proposed NIST Standard for Role-Based Access Control DAVID F. FERRAIOLO National Institute of Standards and Technology RAVI SANDHU SingleSign On. Net and George Mason University, [email protected] or www.list.gmu.edu
Jonathan D. Moffett Department of Computer Science University of York York, United Kingdom
To appear at ACM SACMAT 2002 A Lightweight Approach to Specification and Analysis of Role-based Access Control Extensions (2) Andreas Schaad Department of Computer Science University of York York, United
Role-based Authorization Constraints Specification Using Object Constraint Language
Role-based Authorization Constraints Specification Using Object Constraint Language Gail-Joon Ahn Department of Computer Science University of North Carolina at Charlotte [email protected] Michael. E. Shin
Implement role based access control with attribute certificates
Implement role based access control with attribute certificates Wei Zhou Computer Science Department University of Trier D-54286 Trier, Germany [email protected] Christoph Meinel Computer Science Department
Policy Analysis for Administrative Role Based Access Control
Policy Analysis for Administrative Role Based Access Control Amit Sasturkar Ping Yang Scott D. Stoller C.R. Ramakrishnan Department of Computer Science, Stony Brook University, Stony Brook, NY, 11794,
CHAPTER 22 Database Security Integration Using Role-Based Access Control
CHAPTER 22 Database Security Integration Using Role-Based Access Control Sylvia Osborn Department of Computer Science, The University of Western Ontario London, Ontario, Canada, N6A-5B7 [email protected]
Comparing Simple Role Based Access Control Models and Access Control Lists. Abstract. 1 Introduction
Comparing Simple Role Based Access Control Models and Access Control Lists John Barkley National Institute of Standards and Technology Gait hersburg MD 20899 (301) 975-3346 j barkleyanist.gov Abstract
Completeness, Versatility, and Practicality in Role Based Administration
Completeness, Versatility, and Practicality in Role Based Administration Slobodan Vukanović [email protected] Abstract Applying role based administration to role based access control systems has
Web Services: Role Based Access Control with Single Sign-on Architecture
Rochester Institute of Technology Department of Computer Science M.S. Computer Science Project Proposal Web Services: Role Based Access Control with Single Sign-on Architecture Yevgeniy Gershteyn [email protected]
Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks
Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks Ramaswamy Chandramouli National Institute of Standards and Technology Gaithersburg, MD 20899,USA 001-301-975-5013 [email protected]
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems Na Zhao 1, Min Chen 2, Shu-Ching Chen 1, Mei-Ling Shyu 3 1 Distributed Multimedia Information System Laboratory
A Model for Context-dependent Access Control for Web-based Services with Role-based Approach
A Model for Context-dependent Access Control for Web-based Services with Role-based Approach Ruben Wolf, Thomas Keinz, Markus Schneider FhG Institute for Secure Telecooperation (SIT), 64293 Darmstadt,
XACML Profile for Role Based Access Control (RBAC)
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 XACML Profile for Role Based Access Control (RBAC) Committee Draft 01, 13 February 2004 Document identifier: cs-xacml-rbac-profile-01 Location:
Expressing User Access Authorization Exceptions in Conventional Role-based Access Control
Expressing User Access Authorization Exceptions in Conventional Role-based Access Control Xiaofan Liu 1,2, Natasha Alechina 1, and Brian Logan 1 1 School of Computer Science, University of Nottingham,
An Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
Integrating Attributes into Role-Based Access Control
Integrating Attributes into Role-Based Access Control Qasim Mahmood Rajpoot 1(B), Christian Damsgaard Jensen 1, and Ram Krishnan 2 1 Department of Applied Mathematics and Computer Science, Technical University
ACaaS: Access Control as a Service for IaaS Cloud
ACaaS: Access Control as a Service for IaaS Cloud Ruoyu Wu, Xinwen Zhang, Gail-Joon Ahn, Hadi Sharifi and Haiyong Xie Arizona State University, Tempe, AZ 85287, USA Email: {ruoyu.wu, gahn, hsharif1}@asu.edu
The Economic Impact of Role-Based Access Control
The Economic Impact of Role-Based Access Control Final Report SUBMITTED TO: Gregory Tassey, Ph.D. National Institute of Standards and Technology Acquisition and Assistance Division Building 101, Room A1000
Attributes Enhanced Role-Based Access Control Model
Attributes Enhanced Role-Based Access Control Model Qasim Mahmood Rajpoot 1, Christian Damsgaard Jensen 1 and Ram Krishnan 2 1 Department of Applied Mathematics & Computer Science Technical University
Task-Role Based Dual System Access Control Model
IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.7B, July 2006 211 Task-Role Based Dual System Access Control Model Cui-xiao ZHANG, Ying-xin HU,Guo-bing ZHANG Computer Department,
An Improved Administration Method on Role-Based Access Control in the Enterprise Environment
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 17, 921-944 (2001) An Improved Administration Method on Role-Based Access Control in the Enterprise Environment SEJONG OH AND SEOG PARK * Department of Computer
Controlling Database Access by Providing Access Permissions on Database Objects
International Journal of Scientific & Engineering Research, Volume 4, Issue 4, April-2013 1215 Controlling Database Access by Providing Access Permissions on Database Objects 1 Manushi Majumdar, 2 Anu
Role-Based Access Control (RBAC)
CIS/CSE 785: Computer Security (Syracuse University) RBAC: 1 1 Motivation Role-Based Access Control (RBAC) With many capabilities and privileges in a system, it is difficult to manage them, such as assigning
Strategic Role Engineering Approach to Visual Role Based Access Control (V-RBAC)
International Journal of Computer Applications in Engineering Sciences [VOL III, ISSUE II, JUNE 2013] [ISSN: 2231-4946] Strategic Role Engineering Approach to Visual Role Based Access Control (V-RBAC)
Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach
Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach Ruben Wolf and Markus Schneider Fraunhofer Gesellschaft (FhG), Institute for Secure Telecooperation (SIT)
Advanced Features for Enterprise-Wide Role-Based Access Control
Advanced Features for Enterprise-Wide -Based Access Control Axel Kern Systor Security Solutions GmbH Hermann-Heinrich-Gossen-Str. 3 50858 Köln, Germany [email protected] Abstract The administration
Security Analysis in Role-Based Access Control
Security Analysis in Role-Based Access Control NINGHUI LI Purdue University MAHESH V. TRIPUNITARA Motorola Labs The administration of large Role-Based Access Control (RBAC) systems is a challenging problem.
A Multi-Tenant RBAC Model for Collaborative Cloud Services
2013 Eleventh Annual Conference on Privacy, Security and Trust (PST) A Multi-Tenant RBAC Model for Collaborative Cloud Services Bo Tang, Qi Li and Ravi Sandhu Institute for Cyber Security Department of
Security Analysis in Role-Based Access Control
Security Analysis in Role-Based Access Control NINGHUI LI Purdue University and MAHESH V. TRIPUNITARA Motorola Labs The administration of large role-based access control (RBAC) systems is a challenging
Meta Model Based Integration of Role-Based and Discretionary Access Control Using Path Expressions
Meta Model Based Integration of Role-Based and Discretionary Access Control Using Path Expressions Kathrin Lehmann, Florian Matthes Chair for Software Engineering for Business Information Systems Technische
Role-Based Access Control Approaches In Mangodb 2.4 and Informix Online Dynamic Server Version 7.2
Role-Based Access Control Approaches In Mangodb 2.4 and Informix Online Dynamic Server Version 7.2 Abubakar Sulaiman Gezawa 1, Ahmed Aliyu 2, Tong Yujun 3, Saifullahi Aminu Bello 4, Abubakar Ado 5 System
A logical approach to dynamic role-based access control
A logical approach to dynamic role-based access control Philippe Balbiani Yannick Chevalier Marwa El Houri Abstract Since its formalization RBAC has become the yardstick for the evaluation of access control
Risk-Aware Role-Based Access Control
Risk-Aware Role-Based Access Control Liang Chen and Jason Crampton Information Security Group and Department of Mathematics Royal Holloway, University of London {liang.chen.2005,jason.crampton}@rhul.ac.uk
Role Based Access Control Framework for Network Enterprises
Role Based Access Control Framework for Network Enterprises Dan Thomsen, Dick O Brien, and Jessica Bogle Secure Computing Corporation 2675 Long Lake Road Roseville, MN 55113 [email protected]
Risk-Aware Role-Based Access Control
Risk-Aware Role-Based Access Control Liang Chen Jason Crampton Information Security Group, Royal Holloway, University of London 7th International Workshop on Security and Trust Management Risk-Aware RBAC
Role based access control in a telecommunications operations and maintenance network
Final thesis Role based access control in a telecommunications operations and maintenance network Performed for Ericsson AB by Peter Gunnarsson LITH-IDA-EX 05/012 SE 2005-03-01 Final thesis Role based
The Role-Based Access Control System of a European Bank: A Case Study and Discussion
The Role-Based Access Control System of a European Bank: A Case Study and Discussion Andreas Schaad, Jonathan Moffett and Jeremy Jacob EMail: {andreas, jdm, jeremy}@cs.york.ac.uk Department of Computer
A CROSS - DOMAIN ROLE MAPPING AND AUTHORIZATION FRAMEWORK FOR RBAC IN GRID SYSTEMS
International Journal of Computer Science and Applications c 2009 Technomathematics Research Foundation Vol.6 No.1, pp. 1-12 A CROSS - DOMAIN ROLE MAPPING AND AUTHORIZATION FRAMEWORK FOR RBAC IN GRID SYSTEMS
Implement Role-Based Access Control with Attribute Certificates
Forschungsbericht Nr. 03-5 Implement Role-Based Access Control with Attribute Certificates Wei Zhou, Christoph Meinel Forschungsgruppe Institut für Telematik FB IV-Informatik Universität Trier, 54286,
Role-Based Access Control (RBAC): Features and Motivations
Role-Based Access Control (RBAC): Features and Motivations David F. Ferraiolo, Janet A. Cugini, D. Richard Kuhn National Institute of Standards and Technology U. S. Department of Commerce Gaithersburg
How To Model Access Control Models In Cse543
CSE543 - Introduction to Computer and Network Security Module: Access Control Models Professor Patrick McDaniel Fall 2008 1 Access Control Models What language should I use to express policy? Access Control
Scalable Automated Symbolic Analysis of Administrative Role-Based Access Control Policies by SMT solving
Scalable Automated Symbolic Analysis of Administrative Role-Based Access Control Policies by SMT solving Alessandro Armando 1,2 and Silvio Ranise 2, 1 DIST, Università degli Studi di Genova, Italia 2 Security
Role Based Access Control and OWL
Role Based Access Control and OWL T. Finin 1, A. Joshi 1, L. Kagal 2, J. Niu 3, R. Sandhu 3, W. Winsborough 3, B. Thuraisingham 4 1 University of Maryland, Baltimore County 2 Massachusetts Institute of
CSE543 - Introduction to Computer and Network Security. Module: Access Control
CSE543 - Introduction to Computer and Network Security Module: Access Control Professor Trent Jaeger 1 Policy A policy specifies the rules of security Some statement of secure procedure or configuration
ATTRIBUTE-BASED ACCESS CONTROL MODELS AND IMPLEMENTATION IN CLOUD INFRASTRUCTURE AS A SERVICE
ATTRIBUTE-BASED ACCESS CONTROL MODELS AND IMPLEMENTATION IN CLOUD INFRASTRUCTURE AS A SERVICE APPROVED BY SUPERVISING COMMITTEE: Ravi Sandhu, Ph.D., Co-Chair Ram Krishnan, Ph.D., Co-Chair Rajendra V. Boppana,
Administrative Role-Based Access Control on Top of Security Enhanced Linux
Administrative Role-Based Access Control on Top of Security Enhanced Linux Ayla Solomon Submitted in Partial Fulfillment of the Prerequisite for Honors in Computer Science June 2009 Copyright Ayla Solomon,
Role Based Access Control: Adoption and Implementation in the Developing World
Role Based Access Control: Adoption and Implementation in the Developing World By Loy A.K. Muhwezi Master s Thesis in Computer Science Thesis number: Supervised By Dr. Martijn Oostdijk Radboud University
The Future of Access Control: Attributes, Automation and Adaptation
Institute for Cyber Security The Future of Access Control: Attributes, Automation and Adaptation Prof. Ravi Sandhu Executive Director and Endowed Chair SERE NIST, Gaithersberg June 19, 2013 [email protected]
USER ACCESS CONTROL AND SECURITY MODEL
102 USER ACCESS CONTROL AND SECURTY MODEL Cahyo Crysdian, Harihodin b. Selamat, Mohd. Noor b. Md. Sap ([email protected], [email protected], [email protected]) Faculty of Computer Science and nformation
A logical approach to role-based access control in a distributed environment
A logical approach to role-based access control in a distributed environment Université Paul Sabatier, IRIT COPS - February 2008 Motivation Express access control policies in distributed systems. Take
Testing security policies: going beyond functional testing
Testing security policies: going beyond functional testing Yves Le Traon, Tejeddine Mouelhi GET-ENST Bretagne 35576 Cesson Sévigné Cedex, France {yves.letraon,tejeddine.mouelhi} @enst-bretagne.fr Benoit
A GTRBAC Based System for Dynamic Workflow Composition and Management
A GTRBAC Based System for Dynamic Workflow Composition and Management Basit Shafiq, Arjmand Samuel, and Halima Ghafoor Purdue University {shafiq, amsamuel}@ecn.purdue.edu Abstract In this paper, we propose
An electronic cash scheme and its management
An electronic cash scheme and its management Hua Wang (*) Yanchun Zhang (**) Jinli Cao (***) (*)Department of Maths & Computing, University of Southern Queensland Toowoomba QLD 4350 Australia Email: [email protected]
A Semantic Approach for Access Control in Web Services
A Semantic Approach for Access Control in Web Services M. I. Yagüe, J. Mª Troya Computer Science Department, University of Málaga, Málaga, Spain {yague, troya}@lcc.uma.es Abstract One of the most important
The Role-Based Access Control System of a European Bank: A Case Study and Discussion
The Role-Based Access Control System of a European Bank: A Case Study and Discussion Andreas Schaad Department of Computer Science University of York York, YO10 5DD, UK [email protected] Jonathan Moffett
Towards Secure Information Sharing Models for Community Cyber Security
Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu Dept. of Computer Science Institute for Cyber Security University of Texas at San Antonio Email: [email protected]
An Application of Integrating Role and Lattice Based Access Control in Database Engineering
An Application of Integrating Role and Lattice Based Access Control in Database Engineering Ioannis Mavridis 1, George Pangalos 2, Stavros Kortesis 2 and Isabella Kotini 3 1 Department of Applied Informatics
CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University
CS377: Database Systems Data Security and Privacy Li Xiong Department of Mathematics and Computer Science Emory University 1 Principles of Data Security CIA Confidentiality Triad Prevent the disclosure
Analyzing and Managing Role-Based Access Control Policies
1 Analyzing and Managing Role-Based Access Control Policies Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, and Martin Gogolla Abstract Today more and more security-relevant data is stored on computer
CryptographicallyEnforced
Cryptographically CryptographicallyEnforced Enforced RBAC RBAC Georg Fuchsbauer (IST Austria) 27 June 2013, CSF joint work with Anna Lisa Ferrara and Bogdan Warinschi (University of Bristol) Overview Cryptographically
