File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/11533733_2
- Scopus: eid_2-s2.0-33646034897
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Secure role activation and authorization in the enterprise environment
Title | Secure role activation and authorization in the enterprise environment |
---|---|
Authors | |
Keywords | Digital Credential Proxy Signature Role Activation Role Based Access Control |
Issue Date | 2005 |
Publisher | Springer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/ |
Citation | Lecture Notes In Computer Science (Including Subseries Lecture Notes In Artificial Intelligence And Lecture Notes In Bioinformatics), 2005, v. 3545 LNCS, p. 22-35 How to Cite? |
Abstract | Role Based Access Control (RBAC) [3] is a popular approach to specify and enforce security policies in organizations. In large enterprise systems, the number of users, roles and permissions can be in hundreds or thousands and the security management can be a tedious task. One way to simplify the security management in RBAC is to allow the specification and the enforcement of dynamic constraints to be decentralized [7]. In this paper, we discuss the issues for supporting secure role activation and authorization when the decentralized approach to role activation management is adopted. Secure protocols are proposed to handle the processes of role assignment, role activation and authorization. © Springer-Verlag Berlin Heidelberg 2005. |
Persistent Identifier | http://hdl.handle.net/10722/151879 |
ISSN | 2023 SCImago Journal Rankings: 0.606 |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lui, RWC | en_US |
dc.contributor.author | Hui, LCK | en_US |
dc.contributor.author | Yiu, SM | en_US |
dc.date.accessioned | 2012-06-26T06:30:19Z | - |
dc.date.available | 2012-06-26T06:30:19Z | - |
dc.date.issued | 2005 | en_US |
dc.identifier.citation | Lecture Notes In Computer Science (Including Subseries Lecture Notes In Artificial Intelligence And Lecture Notes In Bioinformatics), 2005, v. 3545 LNCS, p. 22-35 | en_US |
dc.identifier.issn | 0302-9743 | en_US |
dc.identifier.uri | http://hdl.handle.net/10722/151879 | - |
dc.description.abstract | Role Based Access Control (RBAC) [3] is a popular approach to specify and enforce security policies in organizations. In large enterprise systems, the number of users, roles and permissions can be in hundreds or thousands and the security management can be a tedious task. One way to simplify the security management in RBAC is to allow the specification and the enforcement of dynamic constraints to be decentralized [7]. In this paper, we discuss the issues for supporting secure role activation and authorization when the decentralized approach to role activation management is adopted. Secure protocols are proposed to handle the processes of role assignment, role activation and authorization. © Springer-Verlag Berlin Heidelberg 2005. | en_US |
dc.language | eng | en_US |
dc.publisher | Springer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/ | en_US |
dc.relation.ispartof | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | en_US |
dc.subject | Digital Credential | en_US |
dc.subject | Proxy Signature | en_US |
dc.subject | Role Activation | en_US |
dc.subject | Role Based Access Control | en_US |
dc.title | Secure role activation and authorization in the enterprise environment | en_US |
dc.type | Conference_Paper | en_US |
dc.identifier.email | Hui, LCK:hui@cs.hku.hk | en_US |
dc.identifier.email | Yiu, SM:smyiu@cs.hku.hk | en_US |
dc.identifier.authority | Hui, LCK=rp00120 | en_US |
dc.identifier.authority | Yiu, SM=rp00207 | en_US |
dc.description.nature | link_to_subscribed_fulltext | en_US |
dc.identifier.doi | 10.1007/11533733_2 | en_US |
dc.identifier.scopus | eid_2-s2.0-33646034897 | en_US |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-33646034897&selection=ref&src=s&origin=recordpage | en_US |
dc.identifier.volume | 3545 LNCS | en_US |
dc.identifier.spage | 22 | en_US |
dc.identifier.epage | 35 | en_US |
dc.publisher.place | Germany | en_US |
dc.identifier.scopusauthorid | Lui, RWC=8980575800 | en_US |
dc.identifier.scopusauthorid | Hui, LCK=8905728300 | en_US |
dc.identifier.scopusauthorid | Yiu, SM=7003282240 | en_US |
dc.identifier.issnl | 0302-9743 | - |