Specification and classification of role-based authorization policies

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Scopus citations

Abstract

Constraints are an important aspect of role-based access control (RBAC). Although the importance of constraints in RBAC has been recognized for a long time, they have not received much attention. In this paper we classify RBAC constraints into two major classes called prohibition constraints and obligation constraints. To specify these constraints, we utilize a formal language, named RCL2000. In this paper we show that prohibition, cardinality, and obligation constraints can be also represented in RCL2000.

Original languageEnglish (US)
Title of host publicationProceedings - 12th IEEE International Workshops on Enabling Technologies
Subtitle of host publicationInfrastructure for Collaborative Enterprises, WETICE 2003
PublisherIEEE Computer Society
Pages202-207
Number of pages6
ISBN (Electronic)0769519636
DOIs
StatePublished - 2003
Externally publishedYes
Event12th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE 2003 - Linz, Austria
Duration: Jun 9 2003Jun 11 2003

Publication series

NameProceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE
Volume2003-January
ISSN (Print)1524-4547

Other

Other12th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE 2003
Country/TerritoryAustria
CityLinz
Period6/9/036/11/03

Keywords

  • Access control
  • Authorization
  • Collaborative work
  • Computer crime
  • Computer errors
  • Conferences
  • Costs
  • Formal languages
  • Permission
  • Specification languages

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'Specification and classification of role-based authorization policies'. Together they form a unique fingerprint.

Cite this