Role-based security
- 1 April 1993
- journal article
- Published by Association for Computing Machinery (ACM) in ACM SIGSAC Review
- Vol. 11 (2) , 11-17
- https://doi.org/10.1145/153949.153952
Abstract
User role-based protection presents a flexible (hence adaptive) means for enforcing differing ranges of security policies. It can emulate both mandatory and discretionary access control modes of protection. Role-based protection enforces the principle of least privilege, hence minimizing the risk of Trojan horse attacks. This paper offers a glimpse into the strengths (and some weaknesses) of role-based protection, the structures for its enforcement and pointers to the direction for future research.Keywords
This publication has 6 references indexed in Scilit:
- On the design and administration of secure database transactionsACM SIGSAC Review, 1992
- A model of authorization for next-generation database systemsACM Transactions on Database Systems, 1991
- Recognizing immediacy in an N-tree hierarchy and its application to protection groupsIEEE Transactions on Software Engineering, 1989
- The NTree: a two dimension partial order for protection groupsACM Transactions on Computer Systems, 1988
- Operating System Structures to Support Security and Reliable SoftwareACM Computing Surveys, 1976
- A lattice model of secure information flowCommunications of the ACM, 1976