Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,294 papers from all fields of science
Search
Sign In
Create Free Account
Organisation-based access control
Known as:
OrBAC
In computer security, organization-based access control (OrBAC) is an access control model first presented in 2003. The current approaches of the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
Access control
Access control list
Bell–LaPadula model
Capability-based security
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Dynamic Delegation Based on Temporal Context
Ouarda Bettaz
,
Boustia Narhimene
,
A. Mokhtari
International Conference on Knowledge-Based…
2016
Corpus ID: 46499314
2010
2010
Firewall Configuration based on Specifications of Access Policy and Network Environment
A. Titov
,
V. Zaborovsky
Security and Management
2010
Corpus ID: 17712957
A network firewall is a widespread means to enforce a security policy, however it remains a network device. Such a duality has…
Expand
2010
2010
A delegation model for extended RBAC
Meriam Ben-Ghorbel-Talbi
,
F. Cuppens
,
N. Cuppens-Boulahia
,
A. Bouhoula
International Journal of Information Security
2010
Corpus ID: 8705092
In the field of access control, delegation is an important aspect that is considered part of the administration mechanism. Thus…
Expand
2009
2009
Reaction Policy Model Based on Dynamic Organizations and Threat Context
F. Autrel
,
N. Cuppens-Boulahia
,
F. Cuppens
Database Security
2009
Corpus ID: 10581682
The tasks a system administrator must fulfill become more and more complex as information systems increase in complexity and…
Expand
2008
2008
Revocation Schemes for Delegation Licences
Meriam Ben-Ghorbel-Talbi
,
F. Cuppens
,
N. Cuppens-Boulahia
,
A. Bouhoula
International Conference on Information…
2008
Corpus ID: 18616589
The paper presents revocation schemes in role-based access control models. We are particularly interested in two key issues: how…
Expand
2007
2007
An Integrated Model for Access Control and Information Flow Requirements
S. Ayed
,
N. Cuppens-Boulahia
,
F. Cuppens
Asian Computing Science Conference
2007
Corpus ID: 12909627
Current information systems are more and more complex. They require more interactions between different components and users. So…
Expand
2007
2007
Managing Delegation in Access Control Models
Meriam Ben-Ghorbel-Talbi
,
F. Cuppens
,
N. Cuppens-Boulahia
,
A. Bouhoula
15th International Conference on Advanced…
2007
Corpus ID: 8663180
In the field of access control, delegation is an important aspect that is considered as a part of the administration mechanism…
Expand
2007
2007
Multi-Granular Licences to Decentralize Security Administration
F. Cuppens
,
N. Cuppens-Boulahia
,
C. Coma
2007
Corpus ID: 12678369
There has been for several years a growing interest in defining new access control models and administration facilities for these…
Expand
2007
2007
Integration of Security Policy into System Modeling
Nazim Benaïssa
,
Dominique Cansell
,
D. Méry
Formal Specification and Development in B
2007
Corpus ID: 37018146
We address the proof-based development of (system) models satisfying a security policy. The security policy is expressed in a…
Expand
2005
2005
Dynamic creation of inter-organizational grid virtual organizations
B. Nasser
,
R. Laborde
,
A. Benzekri
,
F. Barrère
,
M. Kamel
IEEE International Conference on e-Science
2005
Corpus ID: 7881486
The grid has emerged as a platform that enables inter-organizational Internet-based collaborations in a sharing space called…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE