Share This Author
Role-Based Access Control Models
Why RBAC is receiving renewed attention as a method of security administration and review is explained, a framework of four reference models developed to better understandRBAC is described, and the use of RBAC to manage itself is discussed.
Adding Attributes to Role-Based Access Control
Merging the best features of RBAC and attribute-based systems can provide effective access control for distributed and rapidly changing applications.
- E. Coyne
- Computer ScienceRBAC '95
- 1 December 1996
This work is intended for classroom use only and must not be used for commercial advantage or for marketing or advertising purposes.
The ARBAC97 model for role-based administration of roles: preliminary description and outline
- R. Sandhu, Venkata Bhamidipati, E. Coyne, Srinivas Ganta, C. E. Youman
- Computer ScienceRBAC '97
- 6 November 1997
The motivation, intuition and outline of a new model for RBAC administration called ARBAC97 (administrative RBAC ‘97) are described, which incorporates URA97, builds upon it to define PRA97 and some components of R RA97, and introduces additional concepts in developing RRA97.
What Works for Whom
- E. Coyne
The findings of the study as presented in this work have been summarized from the the PhD thesis on which this work is based for the purpose of increasing its readability. However, all key tables are…
ABAC and RBAC: Scalable, Flexible, and Auditable Access Management
Is it possible to obtain the flexibility and advantages of attribute-based access control while maintaining role-based access control's advantages for analysis and risk control?
Getting, keeping and caring for unpaid volunteers for professional golf tournament events
The purpose of the study was to seek pathways for continuous improvement in the process of recruitment and retention of unpaid volunteers for staging short-term (one week or less), mass-audience,…
Role-based access control: a multi-dimensional view
- R. Sandhu, E. Coyne, H. Feinstein, C. E. Youman
- Computer ScienceTenth Annual Computer Security Applications…
- 5 December 1994
A vision is laid out on how to approach a common understanding of RBAC, and a first cut is taken at identifying the dimensions ofRBAC, which envisage each dimension as being linearly ordered with respect to the sophistication of features provided.
Surviving your new CEO.
Whether you reinvigorate your career within your company or find fulfillment elsewhere, the key lies in deciding what you want to do--and then doing it right.