Lambda-RBAC: Programming with Role-Based Access Control

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

lambda-RBAC: Programming with Role-Based Access Control

b Bell Labs e-mail address: aje rey bell-labs. om Abstra t. We study me hanisms that permit program omponents to express role onstraints on lients, fo using on programmati se urity me hanisms, whi h permit a ess ontrols to be expressed, in situ, as part of the ode realizing basi fun tionality. In this setting, two questions immediately arise. (1) The user of a omponent fa es the issue of safety...

متن کامل

λ-RBAC: Programming with Role-Based Access Control

We study mechanisms that permit program components to express role constraints on clients, focusing on programmatic security mechanisms, which permit access controls to be expressed, in situ, as part of the code realizing basic functionality. In this setting, two questions immediately arise: – The user of a component faces the issue of safety: is a particular role sufficient to use the componen...

متن کامل

Role - Based Access Control ( Rbac ) Based In Hospital Management

A key issue in any information security is to protect information about all forms against unauthorized access. Innovation access control model is now becoming a need for application on systems due to emerging acts. Role based access control (RBAC) is a feasible alternative to traditional Discretionary Access Control (DAC) and Mandatory Access Control (MAC). RBAC has been presented to be cost op...

متن کامل

uT-RBAC: Ubiquitous Role-Based Access Control Model

In ubiquitous environment that users access resource anytime and anywhere, access control model should consider user’s location information. The proposed uT-RBAC includes the location information for user’s least privilege. It also supports time related information, which enables the access control model to accommodate various ubiquitous environments. The proposed uT-RBAC can be dynamically app...

متن کامل

DS RBAC - Dynamic Sessions in Role Based Access Control

Besides the well established access control models, Discretionary Access Control (DAC) and Mandatory Access Control (MAC), the policy neutral Role Based Access Control (RBAC) is gaining increasing attention. An important step towards a wide acceptance of RBAC has been achieved by the standardization of RBAC through the American National Standards Institute (ANSI). While the mandatory concept of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Logical Methods in Computer Science

سال: 2008

ISSN: 1860-5974

DOI: 10.2168/lmcs-4(1:2)2008