Abstract | ||
---|---|---|
Role-based access control has been a focal area formany security researchers over the last decade. There havebeen a large number of models, and many rich specificationlanguages. However there has been little attention paid tothe way in which access control policy is stored persistently.This paper investigates policy storage from the perspectiveof access control to the policy itself, and of its distributedadministration. |
Year | DOI | Venue |
---|---|---|
2003 | 10.1109/ENABL.2003.1231407 | WETICE |
Keywords | Field | DocType |
authorisation,distributed processing,software architecture,access control policy,distributed administration,policy storage,role-based access control systems | Computer access control,Computer security,Distributed System Security Architecture,Computer science,Authorization,Role-based access control,Discretionary access control,Access control,Software architecture,Distributed computing | Conference |
ISSN | ISBN | Citations |
1080-1383 | 0-7695-1963-6 | 0 |
PageRank | References | Authors |
0.34 | 10 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
András Belokosztolszki | 1 | 0 | 0.34 |
David M. Eyers | 2 | 477 | 45.90 |
Wei Wang | 3 | 1679 | 168.84 |
Ken Moody | 4 | 935 | 85.75 |