A framework for implementing role-based access control using CORBA security service
Open Access
- 28 October 1999
- proceedings article
- Published by Association for Computing Machinery (ACM)
Abstract
The paper shows how role-based access control (RBAC) models could be implemented using CORBA Security service. A con guration of CORBA protection system is de ned. We provide de nitions of RBAC 0 and RBAC 1 implementations in the framework of CORBA Security and describe what is required from an implementation of CORBA Security service in order to support RBAC 0 - RBAC 3 models. 1 Introduction Role-based access control (RBAC) [SCFY96] is a family of reference models in which permissions are...Keywords
This publication has 10 references indexed in Scilit:
- Role-based access control in JavaPublished by Association for Computing Machinery (ACM) ,1998
- Decentralized user-role assignment for Web-based intranetsPublished by Association for Computing Machinery (ACM) ,1998
- Managing role/permission relationships using object access typesPublished by Association for Computing Machinery (ACM) ,1998
- Role based access control with the security administration manager (SAM)Published by Association for Computing Machinery (ACM) ,1997
- RBAC emulation on trusted DG/UXPublished by Association for Computing Machinery (ACM) ,1997
- RBAC support in object-oriented role databasesPublished by Association for Computing Machinery (ACM) ,1997
- Implementing role-based access control using object technologyPublished by Association for Computing Machinery (ACM) ,1996
- Role-based access control modelsComputer, 1996
- NetWare 4 as an example of role-based access controlPublished by Association for Computing Machinery (ACM) ,1996
- Role-based access control in ORACLE7 and Trusted ORACLE7Published by Association for Computing Machinery (ACM) ,1996