Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,724,780 papers from all fields of science
Search
Sign In
Create Free Account
Role hierarchy
In role based access control, the role hierarchy defines an inheritance relationship among roles. For example, the role structure for a bank may…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Broader (1)
Computer access control
Context-based access control
NIST RBAC model
Role-based access control
Separation of duties
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Mining meaningful and rare roles from web application usage patterns
Nurit Gal-Oz
,
Yaron Gonen
,
E. Gudes
Computers & security
2019
Corpus ID: 68015580
2014
2014
Identification and Representation of Caused Motion Constructions
Jena D. Hwang
2014
Corpus ID: 64302552
2013
2013
Authorization Control for a Semantic Data Repository through an Inference Policy Engine
A. Alamri
,
P. Bertók
,
J. Thom
IEEE Transactions on Dependable and Secure…
2013
Corpus ID: 15332990
Semantic models help in achieving semantic interoperability among sources of data and applications. The necessity to efficiently…
Expand
2008
2008
An Automata-based algorithm for description logics around SRIQ
Magdalena Ortiz
Latin-American Workshop on Non-Monotonic…
2008
Corpus ID: 15205205
In this paper we use automata-theoretic techniques to tightly characterize the worst-case complexity of the knowledge base…
Expand
2008
2008
Access Control for Cooperation Systems Based on Group Situation
Minsoo Kim
,
J. Joshi
,
Minkoo Kim
International Conference on Collaborative…
2008
Corpus ID: 18102113
Cooperation systems characterize many emerging environments such as ubiquitous and pervasive systems. Agent based cooperation…
Expand
2007
2007
Trust-Based User-Role Assignment in Role-Based Access Control
Hassan Takabi
,
M. Amini
,
R. Jalili
IEEE/ACS International Conference on Computer…
2007
Corpus ID: 1054845
Role based access control (RBAC) model is naturally suitable to organizations where users are assigned organizational roles with…
Expand
Highly Cited
2006
Highly Cited
2006
Access Control and Authorization Constraints for WS-BPEL
E. Bertino
,
J. Crampton
,
F. Paci
IEEE International Conference on Web Services…
2006
Corpus ID: 275567
Computerized workflow systems have attracted considerable research interest. More recently, there have been several XML-based…
Expand
2005
2005
Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols
Junghyun Nam
,
Seungjoo Kim
,
Dongho Won
Web Information System and Application Conference
2005
Corpus ID: 27675696
A group key agreement protocol is designed to allow a group of parties communicating over an insecure, public network to agree on…
Expand
2005
2005
Short Paper: Towards a Location-Aware Role-Based Access Control Model
I. Ray
,
Lijun Yu
Security and Privacy in Communication Networks
2005
Corpus ID: 17270437
With the growing use of wireless networks and mobile devices, we are moving towards an era where location information will be…
Expand
2003
2003
Schema Based XML Security: RBAC Approach
Xinwen Zhang
,
Jaehong Park
,
R. Sandhu
Database Security
2003
Corpus ID: 15092979
Security of XML instance is a basic problem, especially in enterprise with large number of users and XML objects as well as…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE