A framework for role-based access control in group communication systems

被引:0
|
作者
Nita-Rotaru, C [1 ]
Li, N [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we analyze the requirements access control mechanisms must fulfill in the context of group communication and define a framework for supporting fine-grained access control in client-server group communication systems. Our framework combines role-based access control mechanisms with environment parameters (time, IP address, etc.) to provide support for a wide range of applications with very different requirements. While the access control policy is defined by the application, its efficient enforcement is performed by the group communication system.
引用
收藏
页码:522 / 529
页数:8
相关论文
共 50 条
  • [21] Role delegation in role-based access control
    Na, SangYeob
    Cheon, SuhHyun
    Proceedings of the ACM Workshop on Role-Based Access Control, 2000, : 39 - 44
  • [22] Role-based access control in JavaTM
    Fondazione Ugo Bordoni, Roma, Italy
    Proceedings of the ACM Workshop on Role-Based Access Control, 1998, : 91 - 100
  • [23] Generalized Role-Based Access Control
    Moyer, MJ
    Ahamad, M
    21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2001, : 391 - 398
  • [24] Fuzzy Role-Based Access Control
    Martinez-Garcia, Carles
    Navarro-Arribas, Guillermo
    Borrell, Joan
    INFORMATION PROCESSING LETTERS, 2011, 111 (10) : 483 - 487
  • [25] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (02) : 123 - 136
  • [26] Migrating to role-based access control
    Brooks, K
    FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 71 - 81
  • [27] Study of Role-based Access Control
    Cao Yonghui
    EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5209 - 5212
  • [28] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +
  • [29] A secure, constraint-aware role-based access control interoperation framework
    Baracaldo N.
    Masoumzadeh A.
    Joshi J.
    Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011, 2011, : 200 - 207
  • [30] FRAC: Implementing role-based access control for network file systems
    Bohra, Aniruddha
    Smaldone, Stephen
    Iftode, Liviu
    SIXTH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2007, : 95 - +