Results 281 to 290 of about 19,872,848 (346)

On the role of roles

Proceedings of the ninth ACM symposium on Access control models and technologies, 2004
This paper maintains that for an access-control (AC) mechanism tosupport a wide range of policies, it is best to dispense with any built-insemantics for roles in the mechanism itself---be it the semantics of RBAC, orany other---leaving such semantics to be defined by particular policies.
Xuhui Ao, Naftaly H. Minsky
openaire   +2 more sources

Role-Based Access Control Models

Computer, 1996
Security administration of large systems is complex, but it can be simplified by a role-based access control approach. This article explains why RBAC is receiving renewed attention as a method of security administration and review, describes a framework ...
R. Sandhu   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy