Published in

Proceedings of the 10th ACM conference on Computer and communication security - CCS '03

DOI: 10.1145/948109.948123

Proceedings of the 10th ACM conference on Computer and communication security - CCS '03

DOI: 10.1145/948121.948123

Links

Tools

Export citation

Search in Google Scholar

On permissions, inheritance and role hierarchies

Proceedings article published in 2003 by Jason Crampton
This paper was not found in any repository, but could be made available legally by the author.
This paper was not found in any repository, but could be made available legally by the author.

Full text: Unavailable

Green circle
Preprint: archiving allowed
Green circle
Postprint: archiving allowed
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO

Abstract

Role-based access control and role hierarchies have generated considerable research activity in recent years.In many role-based models the role hierarchy partially determines which roles and permissions are available to users via various inheritance mechanisms.In this paper, we consider the nature of permissions more closely than is customary in the literature and propose a particular structure for permissions.We then introduce a role-based access control model that contains a novel approach to permission inheritance and illustrate how this model can be used to derive a role-based model with multi-level secure properties.We also consider the issue of redundant and consistent permission-role assignments and describe how such assignments can be avoided.