Proposed NIST standard for role-based access control
Citations
862 citations
Cites methods from "Proposed NIST standard for role-bas..."
...Such constraints are also defined in [4]....
[...]
...It is based on the standard for RBAC as proposed in [4]....
[...]
739 citations
Cites methods from "Proposed NIST standard for role-bas..."
...Role-Based Access Control (RBAC, [115]) techniques can be applied in this setting....
[...]
651 citations
Cites methods from "Proposed NIST standard for role-bas..."
...Several access control models have been proposed: DAC[1], MAC[2, 3], RBAC[4, 5, 6], TBAC[7] or TMAC[8]....
[...]
619 citations
Cites background from "Proposed NIST standard for role-bas..."
...Information systems security refers to the protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against denial of service to authorized users, including measures necessary to detect, document, and counter such threats....
[...]
...Accountability: Information accountability ensures that every action of an entity can be uniquely traced back to it....
[...]
...Availability: Information availability ensures that information is available when needed and is not made inaccessible by malicious data denial activities....
[...]
...CERIAS Tech Report 2003-23 A GENERALIZED TEMPORAL ROLE BASED ACCESS MODEL FOR DEVELOPING SECURE SYSTEMS by James B. D. Joshi Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette, IN 47907...
[...]
...I would also like to express my gratitude to Professors Mary P. Harper, Eugene H. Spafford and Hong Z. Tan for their participation in my PhD committee....
[...]
526 citations
Cites methods from "Proposed NIST standard for role-bas..."
...RBAC has been implemented in many commercial systems [45], and an RBAC-standard has therefore been created to ensure that the main principles remain equal across different implementations [46,119]....
[...]
References
5,418 citations
"Proposed NIST standard for role-bas..." refers background in this paper
...[Ferraiolo et al. 1995; Nyanchama and Osborn 1999; Sandhu et al. 1996]....
[...]
...common to the early formal definitions of RBAC proposed by various authors [Ferraiolo et al. 1995; Sandhu et al. 1996; Nyanchama and Osborn 1994]....
[...]
...This feature has often been mentioned in the literature [Ferraiolo et al. 1995; Sandhu et al. 1996; Moffett 1998] and has precedence in existing RBAC implementations....
[...]
...ACM Transactions on Information and System Security, Vol. 4, No. 3, August 2001. common to the early formal definitions of RBAC proposed by various authors [Ferraiolo et al. 1995; Sandhu et al. 1996; Nyanchama and Osborn 1994]....
[...]
2,093 citations
1,230 citations
"Proposed NIST standard for role-bas..." refers background or methods in this paper
...1992], and separation of duty concepts described in earlier papers [Clark and Wilson 1987; Sandhu 1988; Brewer and Nash 1989]....
[...]
...The roots of RBAC include the use of groups in UNIX and other operating systems, privilege groupings in database management systems [Baldwin 1990; Thomsen 1991; Ting et al. 1992], and separation of duty concepts described in earlier papers [Clark and Wilson 1987; Sandhu 1988; Brewer and Nash 1989]....
[...]
...As a security principle, SOD has long been recognized for its wide application in business, industry, and government [Brewer and Nash 1989; Clark and Wilson 1987]....
[...]
1,001 citations
"Proposed NIST standard for role-bas..." refers background or methods in this paper
...1992], and separation of duty concepts described in earlier papers [Clark and Wilson 1987; Sandhu 1988; Brewer and Nash 1989]....
[...]
...The roots of RBAC include the use of groups in UNIX and other operating systems, privilege groupings in database management systems [Baldwin 1990; Thomsen 1991; Ting et al. 1992], and separation of duty concepts described in earlier papers [Clark and Wilson 1987; Sandhu 1988; Brewer and Nash 1989]....
[...]
...As a security principle, SOD has long been recognized for its wide application in business, industry, and government [Brewer and Nash 1989; Clark and Wilson 1987]....
[...]
967 citations
"Proposed NIST standard for role-bas..." refers background in this paper
...A first effort at defining a consensus standard for RBAC was proposed at the 2000 ACM Workshop on Role-Based Access Control [Sandhu et al. 2000]....
[...]