Requirements of role-based access control for collaborative systems
- 1 January 1996
- proceedings article
- Published by Association for Computing Machinery (ACM)
Abstract
In many collaborative systems, users can trigger the execution of commands in a process owned by another user. Unless the access rights of such processes are limited, any user in the collaboration can gain access to another's private files; execute applications on another user's behalf; or read public system files, such as the password file, on another user's machine. However, some applications require limited sharing of private files, so it may be desirable to grant access to these files for a specific purpose. Role-based access control (RBAC) models can be used to limit the access rights of processes, but current implementations do not enable users to flexibly control the access rights of a process at runtime. We define a discretionary access control model that enables principals to flexibly control the access rights of a collaborative process. We then specify the requirements of RBAC models necessary to implement this discretionary access control model.Keywords
This publication has 0 references indexed in Scilit: