Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,354,998 papers from all fields of science
Search
Sign In
Create Free Account
Organisation-based access control
Known as:
OrBAC
In computer security, organization-based access control (OrBAC) is an access control model first presented in 2003. The current approaches of the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
Access control
Access control list
Bell–LaPadula model
Capability-based security
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Dynamic Delegation Based on Temporal Context
Ouarda Bettaz
,
Boustia Narhimene
,
A. Mokhtari
International Conference on Knowledge-Based…
2016
Corpus ID: 46499314
2016
2016
Towards a new generation of industrial firewalls: Operational-process aware filtering
Safaà Hachana
,
F. Cuppens
,
N. Cuppens-Boulahia
Conference on Privacy, Security and Trust
2016
Corpus ID: 14591436
Formerly protected by isolation, the operational technology (OT) networks have become connected to the information technology (IT…
Expand
2010
2010
Firewall Configuration based on Specifications of Access Policy and Network Environment
A. Titov
,
V. Zaborovsky
Security and Management
2010
Corpus ID: 17712957
A network firewall is a widespread means to enforce a security policy, however it remains a network device. Such a duality has…
Expand
2009
2009
A Framework for Translating a High Level Security Policy into Low Level Security Mechanisms
Ahmed A. Hassan
,
Waleed M. Bahgat
IEEE/ACS International Conference on Computer…
2009
Corpus ID: 14999781
A Framework for Translating a High Level Security Policy into Low Level Security Mechanisms Security policies have different…
Expand
2009
2009
Reaction Policy Model Based on Dynamic Organizations and Threat Context
F. Autrel
,
N. Cuppens-Boulahia
,
F. Cuppens
Database Security
2009
Corpus ID: 10581682
The tasks a system administrator must fulfill become more and more complex as information systems increase in complexity and…
Expand
2008
2008
MotOrBAC 2 : a security policy tool
F. Autrel
,
F. Cuppens
,
N. Cuppens
2008
Corpus ID: 15683988
Given the growing complexity of information systems and the di cult task of security policy enforcement, system administrators…
Expand
2008
2008
Revocation Schemes for Delegation Licences
Meriam Ben-Ghorbel-Talbi
,
F. Cuppens
,
N. Cuppens-Boulahia
,
A. Bouhoula
International Conference on Information…
2008
Corpus ID: 18616589
The paper presents revocation schemes in role-based access control models. We are particularly interested in two key issues: how…
Expand
Highly Cited
2008
Highly Cited
2008
Model-Based Tests for Access Control Policies
A. Pretschner
,
Tejeddine Mouelhi
,
Y. L. Traon
International Conference on Information Control…
2008
Corpus ID: 7022887
We present a model-based approach to testing access control requirements. By using combinatorial testing, we first automatically…
Expand
Highly Cited
2008
Highly Cited
2008
A Model-Based Framework for Security Policy Specification, Deployment and Testing
Tejeddine Mouelhi
,
Franck Fleurey
,
B. Baudry
,
Y. L. Traon
ACM/IEEE International Conference on Model Driven…
2008
Corpus ID: 5995292
In this paper, we propose a model-driven approach for specifying, deploying and testing security policies in Java applications…
Expand
2007
2007
Managing Delegation in Access Control Models
Meriam Ben-Ghorbel-Talbi
,
F. Cuppens
,
N. Cuppens-Boulahia
,
A. Bouhoula
15th International Conference on Advanced…
2007
Corpus ID: 8663180
In the field of access control, delegation is an important aspect that is considered as a part of the administration mechanism…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE