File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Secure role activation and authorization in the enterprise environment

TitleSecure role activation and authorization in the enterprise environment
Authors
KeywordsDigital Credential
Proxy Signature
Role Activation
Role Based Access Control
Issue Date2005
PublisherSpringer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/
Citation
Lecture Notes In Computer Science (Including Subseries Lecture Notes In Artificial Intelligence And Lecture Notes In Bioinformatics), 2005, v. 3545 LNCS, p. 22-35 How to Cite?
AbstractRole Based Access Control (RBAC) [3] is a popular approach to specify and enforce security policies in organizations. In large enterprise systems, the number of users, roles and permissions can be in hundreds or thousands and the security management can be a tedious task. One way to simplify the security management in RBAC is to allow the specification and the enforcement of dynamic constraints to be decentralized [7]. In this paper, we discuss the issues for supporting secure role activation and authorization when the decentralized approach to role activation management is adopted. Secure protocols are proposed to handle the processes of role assignment, role activation and authorization. © Springer-Verlag Berlin Heidelberg 2005.
Persistent Identifierhttp://hdl.handle.net/10722/151879
ISSN
2005 Impact Factor: 0.402
2015 SCImago Journal Rankings: 0.252
References

 

DC FieldValueLanguage
dc.contributor.authorLui, RWCen_US
dc.contributor.authorHui, LCKen_US
dc.contributor.authorYiu, SMen_US
dc.date.accessioned2012-06-26T06:30:19Z-
dc.date.available2012-06-26T06:30:19Z-
dc.date.issued2005en_US
dc.identifier.citationLecture Notes In Computer Science (Including Subseries Lecture Notes In Artificial Intelligence And Lecture Notes In Bioinformatics), 2005, v. 3545 LNCS, p. 22-35en_US
dc.identifier.issn0302-9743en_US
dc.identifier.urihttp://hdl.handle.net/10722/151879-
dc.description.abstractRole Based Access Control (RBAC) [3] is a popular approach to specify and enforce security policies in organizations. In large enterprise systems, the number of users, roles and permissions can be in hundreds or thousands and the security management can be a tedious task. One way to simplify the security management in RBAC is to allow the specification and the enforcement of dynamic constraints to be decentralized [7]. In this paper, we discuss the issues for supporting secure role activation and authorization when the decentralized approach to role activation management is adopted. Secure protocols are proposed to handle the processes of role assignment, role activation and authorization. © Springer-Verlag Berlin Heidelberg 2005.en_US
dc.languageengen_US
dc.publisherSpringer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/en_US
dc.relation.ispartofLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)en_US
dc.subjectDigital Credentialen_US
dc.subjectProxy Signatureen_US
dc.subjectRole Activationen_US
dc.subjectRole Based Access Controlen_US
dc.titleSecure role activation and authorization in the enterprise environmenten_US
dc.typeConference_Paperen_US
dc.identifier.emailHui, LCK:hui@cs.hku.hken_US
dc.identifier.emailYiu, SM:smyiu@cs.hku.hken_US
dc.identifier.authorityHui, LCK=rp00120en_US
dc.identifier.authorityYiu, SM=rp00207en_US
dc.description.naturelink_to_subscribed_fulltexten_US
dc.identifier.doi10.1007/11533733_2en_US
dc.identifier.scopuseid_2-s2.0-33646034897en_US
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-33646034897&selection=ref&src=s&origin=recordpageen_US
dc.identifier.volume3545 LNCSen_US
dc.identifier.spage22en_US
dc.identifier.epage35en_US
dc.publisher.placeGermanyen_US
dc.identifier.scopusauthoridLui, RWC=8980575800en_US
dc.identifier.scopusauthoridHui, LCK=8905728300en_US
dc.identifier.scopusauthoridYiu, SM=7003282240en_US

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats