Simulation of the Augmented Typed Access Matrix Model (ATAM) using Roles

@inproceedings{Munawer1999SimulationOT,
  title={Simulation of the Augmented Typed Access Matrix Model (ATAM) using Roles},
  author={Qamar Munawer and R. S. Sandhu},
  year={1999}
}
Role-based Access Control (RBAC) is a promising alternative to traditional discretionary (DAC) and mandatory access (MAC) controls. In RBAC permissions are associated with roles, and users are made members of the roles thereby acquiring the roles’ permissions. RBAC is policy neutral and flexible enough to accommodate diverse security policies. Access matrix models define another mechanism for enforcing the security policy. The Augmented Typed Access Matrix model (ATAM), an extension of Typed… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 18 CITATIONS

Comparing the expressive power of access control models

  • ACM Conference on Computer and Communications Security
  • 2004
VIEW 10 EXCERPTS
CITES METHODS, BACKGROUND & RESULTS
HIGHLY INFLUENCED

TECHNIQUES FOR APPLICATION-AWARE SUITABILITY ANALYSIS OF ACCESS CONTROL SYSTEMS

VIEW 5 EXCERPTS
CITES RESULTS, METHODS & BACKGROUND
HIGHLY INFLUENCED

Towards Formal Verification of Role-Based Access Control Policies

  • IEEE Transactions on Dependable and Secure Computing
  • 2008
VIEW 9 EXCERPTS
CITES METHODS & RESULTS
HIGHLY INFLUENCED

Security Analysis and Administrative Insider Threat Assessment in Role-Based Access Control

VIEW 8 EXCERPTS
CITES METHODS, BACKGROUND & RESULTS
HIGHLY INFLUENCED

Security analysis in role-based access control

VIEW 6 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Decomposing, Comparing, and Synthesizing Access Control Expressiveness Simulations

  • 2015 IEEE 28th Computer Security Foundations Symposium
  • 2015
VIEW 1 EXCERPT
CITES METHODS

A firewall model of file system security

VIEW 2 EXCERPTS
CITES METHODS & BACKGROUND

Application-Sensitive Access Control Evaluation Using Parameterized Expressiveness

  • 2013 IEEE 26th Computer Security Foundations Symposium
  • 2013
VIEW 1 EXCERPT
CITES METHODS

References

Publications referenced by this paper.
SHOWING 1-10 OF 10 REFERENCES

Similar Papers

Loading similar papers…