Back to Search Start Over

Role Activation Management in Role Based Access Control.

Authors :
Boyd, Colin
González Nieto, Juan M.
Lui, Richard W. C.
Chow, Sherman S. M.
Hui, Lucas C. K.
Yiu, S. M.
Source :
Information Security & Privacy (9783540265474); 2005, p358-369, 12p
Publication Year :
2005

Abstract

Role Based Access Control (RBAC) [6] is a popular approach to specify and enforce security policies in organizations. In RBAC, users are not directly assigned permission but with the use of roles as the intermediary. Role activation is one important component in RBAC. A user may activate a subset of his/her assigned roles to exercise the associated permission. This paper proposes a number of ways in which the role activation constraints can be specified and enforced in the enterprise environment. Also, an access control model and an authorization process are proposed to support the specification and enforcement of dynamic separation of duty constraints in a decentralized manner. Key words: Role Based Access Control, Security Management, Role Activation, Dynamic Separation of Duty [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISBNs :
9783540265474
Database :
Supplemental Index
Journal :
Information Security & Privacy (9783540265474)
Publication Type :
Book
Accession number :
32892420
Full Text :
https://doi.org/10.1007/11506157_30