Abstract | ||
---|---|---|
The last two decades have witnessed an emergence of role-based access control (RBAC) as the de facto standard for access control. However, for organisations already having a deployed RBAC system, in many cases it may become necessary to associate a temporal dimension with the existing access control policies due to changing organisational requirements. In such cases, migration from RBAC to a tempo... |
Year | DOI | Venue |
---|---|---|
2017 | 10.1049/iet-ifs.2016.0258 | IET Information Security |
Keywords | Field | DocType |
authorisation,data mining | De facto standard,Computer science,Computer network,Role-based access control,Access control,Distributed computing | Journal |
Volume | Issue | ISSN |
11 | 5 | 1751-8709 |
Citations | PageRank | References |
2 | 0.38 | 21 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Barsha Mitra | 1 | 43 | 4.79 |
Shamik Sural | 2 | 1008 | 96.36 |
Jaideep Vaidya | 3 | 2778 | 171.18 |
Vijayalakshmi Atluri | 4 | 3256 | 424.98 |