Least privileges and role's inheritance of RBAC

被引:0
|
作者
Han, Lan-Sheng [1 ]
Hong, Fan [1 ]
Kojo, Asiedu Baffour [2 ]
机构
[1] College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China
[2] Computer Science and Technology Department, School of Computer Science and Engineering, P. O. Box: 3327, Kumasi, Ghana
关键词
9;
D O I
10.1007/bf02831728
中图分类号
学科分类号
摘要
引用
收藏
页码:185 / 187
相关论文
共 50 条
  • [21] A Verification Framework for Temporal RBAC with Role Hierarchy
    Mondal, Samrat
    Sural, Shamik
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2008, 5352 : 140 - 147
  • [22] Role permission in hierarchy relation of RBAC model
    Gu, Chun-Hua
    Xiao, Bao-Liang
    Huadong Ligong Daxue Xuebao /Journal of East China University of Science and Technology, 2007, 33 (01): : 96 - 99
  • [23] HEGEL'S APPROACH TO CLASS PRIVILEGES
    Rosanovich, Damian J.
    HEGEL-STUDIEN, 2017, 50 : 97 - 119
  • [24] Sedation privileges at children's hospitals
    Foster, D.
    Willis, C. R.
    Nelson, E.
    Dick, R.
    JOURNAL OF INVESTIGATIVE MEDICINE, 2008, 56 (01) : 355 - 355
  • [25] Women's inheritance rights in Malawi: the role of District Assemblies
    Chiweza, Asiyati
    DEVELOPMENT IN PRACTICE, 2005, 15 (01) : 83 - 89
  • [26] A novel approach for role hierarchies in flexible RBAC workflow
    Sun, Yuqing
    Meng, Xiangxu
    Yin, Fang
    10TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2006, : 488 - 491
  • [27] λ-RBAC: PROGRAMMING WITH ROLE-BASED ACCESS CONTROL
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    LOGICAL METHODS IN COMPUTER SCIENCE, 2008, 4 (01)
  • [28] THE ROLE OF INHERITANCE IN BEHAVIOR
    PLOMIN, R
    SCIENCE, 1990, 248 (4952) : 183 - 188
  • [29] Role slices: A notation for RBAC permission assignment and enforcement
    Pavlich-Mariscal, JA
    Doan, T
    Michel, L
    Demurjian, SA
    Ting, TC
    DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 40 - 53
  • [30] λ-RBAC:: Programming with role-based access control
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, 2006, 4052 : 456 - 467