Keyword : RBAC


Atom-Role-Based Access Control Model
Weihong CAI Richeng HUANG Xiaoli HOU Gang WEI Shui XIAO Yindong CHEN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/07/01
Vol. E95-D  No. 7 ; pp. 1908-1917
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
access controlRBACatom roleATRBAC
 Summary | Full Text:PDF(954.5KB)

Extending a Role Graph for Role-Based Access Control
Yoshiharu ASAKURA Yukikazu NAKAMOTO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/02/01
Vol. E92-D  No. 2 ; pp. 211-219
Type of Manuscript:  Special Section PAPER (Special Section on Foundations of Computer Science)
Category: 
Keyword: 
RBACrole graphtransformation algorithmequivalence
 Summary | Full Text:PDF(671.7KB)

Security Violation Detection for RBAC Based Interoperation in Distributed Environment
Xinyu WANG Jianling SUN Xiaohu YANG Chao HUANG Di WU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5 ; pp. 1447-1456
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Access Control
Keyword: 
RBACinteroperationdistributed environmentsecurity violation
 Summary | Full Text:PDF(403.2KB)

uT-RBAC: Ubiquitous Role-Based Access Control Model
Song-hwa CHAE Wonil KIM Dong-Kyoo KIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1 ; pp. 238-239
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: Access Control
Keyword: 
access controlRBACubiquitous computing
 Summary | Full Text:PDF(86.9KB)

Extended Role Based Access Control with Procedural Constraints for Trusted Operating Systems
Wook SHIN Jong-Youl PARK Dong-Ik LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2005/03/01
Vol. E88-D  No. 3 ; pp. 619-627
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
trusted operating systemsecurity kernelreference monitorsecure operating systemaccess controlRBACprocedural constraints
 Summary | Full Text:PDF(817.3KB)