Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,258,383 papers from all fields of science
Search
Sign In
Create Free Account
Role-based access control
Known as:
Role based security
, Role-based security
, RBAC
Expand
In computer systems security, role-based access control (RBAC) is an approach to restricting system access to authorized users. It is used by the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
46 relations
AIX
Access control
Access control expression
Access control list
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Cryptographic Enforcement of Role-Based Access Control
J. Crampton
USENIX Conference on File and Storage…
2010
Corpus ID: 15097912
Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are…
Expand
2008
2008
Role Based Access Control and OWL
Timothy W. Finin
,
A. Joshi
,
+4 authors
B. Thuraisingham
OWL: Experiences and Directions
2008
Corpus ID: 429552
Current access control research follows two parallel themes: many efforts focus on developing novel access control models meeting…
Expand
2007
2007
An Introduction to Role-Based Access Control
I. Clark
Information Security Management Handbook, 6th ed.
2007
Corpus ID: 38454693
Today’s large organization’s information technology (IT) infrastructure is a mix of complex incompatible operating systems…
Expand
2007
2007
Role-Based Access Control
Sylvia L. Osborn
Security, Privacy, and Trust in Modern Data…
2007
Corpus ID: 7516086
Role-based access control (RBAC) models have been introduced by several groups of researchers. We first introduce the basic…
Expand
2006
2006
Task-role-based access control model
Chen Youping
2006
Corpus ID: 64245138
Access control is an important measure to secure the information system, but the traditional access control models cannot fully…
Expand
Highly Cited
2005
Highly Cited
2005
Rule support for role-based access control
A. Kern
,
C. Walhorn
ACM Symposium on Access Control Models and…
2005
Corpus ID: 8130269
The administration of users and access rights in large enterprises is a complex and challenging task. Role-based access control…
Expand
Review
2005
Review
2005
Service-Oriented Role-Based Access Control
Xu Feng
2005
Corpus ID: 63108583
Service oriented architecture (SOA) is an evolution of client/server architecture. A SOA based system can transparently…
Expand
2003
2003
Timed Role-Based Access Control
H. Jian
2003
Corpus ID: 59809789
The research work of RBAC is greatly emphasized in recent years. However, the main work focuses on some characters which have…
Expand
Highly Cited
2000
Highly Cited
2000
Modeling users in role-based access control
Sylvia L. Osborn
,
Yuxia Guo
ACM Workshop on Role-Based Access Control
2000
Corpus ID: 14449947
The essential properties of a simple model for users, groups and group hierarchies for role-based access control, embodied in a…
Expand
1996
1996
Characteristics of role-based access control
V. Gligor
ACM Workshop on Role-Based Access Control
1996
Corpus ID: 35691993
Copyright 1996 Association for Computing Machinery. Permission to make digital/hard copy of all or part of this work for personal…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE