Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,085,414 papers from all fields of science
Search
Sign In
Create Free Account
Role-based access control
Known as:
Role based security
, Role-based security
, RBAC
Expand
In computer systems security, role-based access control (RBAC) is an approach to restricting system access to authorized users. It is used by the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
46 relations
AIX
Access control
Access control expression
Access control list
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Cryptographic Enforcement of Role-Based Access Control
J. Crampton
USENIX Conference on File and Storage…
2010
Corpus ID: 15097912
Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are…
Expand
2008
2008
Role Based Access Control and OWL
Timothy W. Finin
,
A. Joshi
,
+4 authors
B. Thuraisingham
OWL: Experiences and Directions
2008
Corpus ID: 429552
Current access control research follows two parallel themes: many efforts focus on developing novel access control models meeting…
Expand
2007
2007
Trust-Based User-Role Assignment in Role-Based Access Control
Hassan Takabi
,
M. Amini
,
R. Jalili
IEEE/ACS International Conference on Computer…
2007
Corpus ID: 1054845
Role based access control (RBAC) model is naturally suitable to organizations where users are assigned organizational roles with…
Expand
2006
2006
Task-role-based access control model
Chen Youping
2006
Corpus ID: 64245138
Access control is an important measure to secure the information system, but the traditional access control models cannot fully…
Expand
2006
2006
A New Role-based Access Control Model
Liu Rui
2006
Corpus ID: 203666667
This paper analyzes the drawback of role-based access control model that is onerous secure maintenance costs in the systems which…
Expand
Review
2005
Review
2005
Service-Oriented Role-Based Access Control
Xu Feng
2005
Corpus ID: 63108583
Service oriented architecture (SOA) is an evolution of client/server architecture. A SOA based system can transparently…
Expand
2004
2004
A Role-based Access Control Model
W. Jianping
2004
Corpus ID: 203672842
This paper analyzes several kinds of access control technique and discusses the RBAC(role-based access control) model and the…
Expand
2003
2003
Timed Role-Based Access Control
H. Jian
2003
Corpus ID: 59809789
The research work of RBAC is greatly emphasized in recent years. However, the main work focuses on some characters which have…
Expand
2003
2003
Towards dynamically administered role-based access control
ANDREAS MATTAS
,
I. Mavridis
,
G. Pangalos
14th International Workshop on Database and…
2003
Corpus ID: 10578881
In digital business, the need for efficient frameworks to address the multifaceted security issues related to Web-based…
Expand
2000
2000
Administrative models for role-based access control
Q. Munawer
,
R. Sandhu
2000
Corpus ID: 107690978
Role-Based Access Control (RBAC) is a flexible and policy-neutral access control technology. For large systems, with hundreds of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE