File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Role activation management in role based access control

TitleRole activation management in role based access control
Authors
KeywordsDynamic Separation of Duty
Role Activation
Role Based Access Control
Security Management
Issue Date2005
PublisherSpringer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/
Citation
Lecture Notes In Computer Science, 2005, v. 3574, p. 358-369 How to Cite?
AbstractRole Based Access Control (RBAC) [6] is a popular approach to specify and enforce security policies in organizations. In RBAC, users are not directly assigned permission but with the use of roles as the intermediary. Role activation is one important component in RBAC. A user may activate a subset of his/her assigned roles to exercise the associated permission. This paper proposes a number of ways in which the role activation constraints can be specified and enforced in the enterprise environment. Also, an access control model and an authorization process are proposed to support the specification and enforcement of dynamic separation of duty constraints in a decentralized manner. © Springer-Verlag Berlin Heidelberg 2005.
Persistent Identifierhttp://hdl.handle.net/10722/93469
ISSN
2023 SCImago Journal Rankings: 0.606
References

 

DC FieldValueLanguage
dc.contributor.authorLui, RWCen_HK
dc.contributor.authorChow, SSMen_HK
dc.contributor.authorHui, LCKen_HK
dc.contributor.authorYiu, SMen_HK
dc.date.accessioned2010-09-25T15:02:06Z-
dc.date.available2010-09-25T15:02:06Z-
dc.date.issued2005en_HK
dc.identifier.citationLecture Notes In Computer Science, 2005, v. 3574, p. 358-369en_HK
dc.identifier.issn0302-9743en_HK
dc.identifier.urihttp://hdl.handle.net/10722/93469-
dc.description.abstractRole Based Access Control (RBAC) [6] is a popular approach to specify and enforce security policies in organizations. In RBAC, users are not directly assigned permission but with the use of roles as the intermediary. Role activation is one important component in RBAC. A user may activate a subset of his/her assigned roles to exercise the associated permission. This paper proposes a number of ways in which the role activation constraints can be specified and enforced in the enterprise environment. Also, an access control model and an authorization process are proposed to support the specification and enforcement of dynamic separation of duty constraints in a decentralized manner. © Springer-Verlag Berlin Heidelberg 2005.en_HK
dc.languageengen_HK
dc.publisherSpringer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/en_HK
dc.relation.ispartofLecture Notes in Computer Scienceen_HK
dc.subjectDynamic Separation of Dutyen_HK
dc.subjectRole Activationen_HK
dc.subjectRole Based Access Controlen_HK
dc.subjectSecurity Managementen_HK
dc.titleRole activation management in role based access controlen_HK
dc.typeConference_Paperen_HK
dc.identifier.emailHui, LCK:hui@cs.hku.hken_HK
dc.identifier.emailYiu, SM:smyiu@cs.hku.hken_HK
dc.identifier.authorityHui, LCK=rp00120en_HK
dc.identifier.authorityYiu, SM=rp00207en_HK
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.scopuseid_2-s2.0-26444520752en_HK
dc.identifier.hkuros122095en_HK
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-26444520752&selection=ref&src=s&origin=recordpageen_HK
dc.identifier.volume3574en_HK
dc.identifier.spage358en_HK
dc.identifier.epage369en_HK
dc.publisher.placeGermanyen_HK
dc.identifier.scopusauthoridLui, RWC=8980575800en_HK
dc.identifier.scopusauthoridChow, SSM=8980575500en_HK
dc.identifier.scopusauthoridHui, LCK=8905728300en_HK
dc.identifier.scopusauthoridYiu, SM=7003282240en_HK
dc.identifier.issnl0302-9743-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats