Published in

Springer, Lecture Notes in Computer Science, p. 358-369, 2005

DOI: 10.1007/11506157_30

Links

Tools

Export citation

Search in Google Scholar

Role activation management in role based access control

Proceedings article published in 2005 by Rwc W. C. Lui, Ssm S. M. Chow ORCID, Lck C. K. Hui, Sm M. Yiu
Distributing this paper is prohibited by the publisher
Distributing this paper is prohibited by the publisher

Full text: Unavailable

Red circle
Preprint: archiving forbidden
Orange circle
Postprint: archiving restricted
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO

Abstract

Role Based Access Control (RBAC) [6] is a popular approach to specify and enforce security policies in organizations. In RBAC, users are not directly assigned permission but with the use of roles as the intermediary. Role activation is one important component in RBAC. A user may activate a subset of his/her assigned roles to exercise the associated permission. This paper proposes a number of ways in which the role activation constraints can be specified and enforced in the enterprise environment. Also, an access control model and an authorization process are proposed to support the specification and enforcement of dynamic separation of duty constraints in a decentralized manner. © Springer-Verlag Berlin Heidelberg 2005.