Access Rights Administration in Role-Based Security Systems

  title={Access Rights Administration in Role-Based Security Systems},
  author={Matunda Nyanchama and Sylvia L. Osborn},
This paper examines the concept of role-based protection and, in particular, role organization. From basic role relationships, a model for role organization is developed. The role graph model, its operator semantics based on graph theory and algorithms for role administration are proposed. The role graph model, in our view, presents a very generalized form of role organization for access rights administration. It is shown how the model simulates other organizational structures such as… CONTINUE READING
Highly Influential
This paper has highly influenced 10 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS


Publications citing this paper.
Showing 1-10 of 83 extracted citations


Publications referenced by this paper.
Showing 1-10 of 17 references


  • D. J. Thomsen. Role-Based Application Design, Enforcement. In S. Jajodia, C. E. Landwehr
  • Database Security, IV: Status and Prospects…
  • 1991
Highly Influential
4 Excerpts

Computers & Security

  • L. G. Lawrence. The Role of Roles
  • 12(1):15{21, Feb
  • 1993

Object Oriented Databases & Separation of Duty

  • M. Nyanchama, S. L. Osborn. Role-Based Security
  • ACM SIGMOD RECORD, 22(4):45{51, Dec
  • 1993
1 Excerpt


  • J. Glasgow, G. MacEwen, P. Panangaden. A Logic for Reasoning About Security. Systems
  • August
  • 1992
1 Excerpt

On the Design & Administration of Secure Database Transactions

  • E. V. Krishnamurthy, A. McGu n
  • ACM SIGSAC Review, pages 63{70, Spring/Summer
  • 1992


  • F. Rabitti, E. Bertino, D. Woelk, W. Kim. A Model of Authorization for Next Generation TODS
  • March
  • 1991

Naming & Grouping Privileges to Simplify Security Management in Large Databases

  • R. W. Baldwin
  • IEEE Symposium on Research in Security and…
  • 1990

Similar Papers

Loading similar papers…