Delegation in role-based access control
J Crampton, H Khambhammettu - International Journal of Information …, 2008 - Springer
User delegation is a mechanism for assigning access rights available to one user to another
user. A delegation can either be a grant or transfer operation. Existing work on delegation in …
user. A delegation can either be a grant or transfer operation. Existing work on delegation in …
DW-RBAC: A formal security model of delegation and revocation in workflow systems
One reason workflow systems have been criticized as being inflexible is that they lack
support for delegation. This paper shows how delegation can be introduced in a workflow …
support for delegation. This paper shows how delegation can be introduced in a workflow …
Analyzing and managing role-based access control policies
Today more and more security-relevant data is stored on computer systems; security-critical
business processes are mapped to their digital counterparts. This situation applies to …
business processes are mapped to their digital counterparts. This situation applies to …
A mechanism to resolve the unauthorized access vulnerability caused by permission delegation in blockchain-based access control
J Shi, R Li, W Hou - IEEE Access, 2020 - ieeexplore.ieee.org
Permission delegation in access control provides the subject with a second method to obtain
object permissions in addition to permission granting. It is especially applicable when the …
object permissions in addition to permission granting. It is especially applicable when the …
Delegation in role-based access control
J Crampton, H Khambhammettu - Computer Security–ESORICS 2006 …, 2006 - Springer
User delegation is a mechanism for assigning access rights available to a user to another
user. A delegation operation can either be a grant or transfer operation. Delegation for role …
user. A delegation operation can either be a grant or transfer operation. Delegation for role …
Capability-based delegation model in RBAC
K Hasebe, M Mabuchi, A Matsushita - … of the 15th ACM symposium on …, 2010 - dl.acm.org
For flexible and dynamic resource management in environments where users collaborate to
fulfill their common tasks, various attempts at modeling delegation of authority have been …
fulfill their common tasks, various attempts at modeling delegation of authority have been …
Design and implementation of a secure and flexible access-right delegation for resource constrained environments
T Rabehaja, S Pal, M Hitchens - Future Generation Computer Systems, 2019 - Elsevier
With the emergence of the Internet of Things (IoT) technology, devices are becoming more
ubiquitous and openly accessible to the users. Commonly, IoT devices are constrained in …
ubiquitous and openly accessible to the users. Commonly, IoT devices are constrained in …
Enterprise level security: securing information systems in an uncertain world
WR Simpson - Communications of the ACM, 2016 - api.taylorfrancis.com
Preface is book has been derived from 14 years of research, pilots, and operational trials in
putting together an enterprise system. e later chapters (8 through 22) contain information …
putting together an enterprise system. e later chapters (8 through 22) contain information …
Handling least privilege problem and role mining in RBAC
For a given role-based access control (RBAC) configuration, user-role assignment satisfying
least privilege principle (specified as LPUAP) is one of the most important problems to be …
least privilege principle (specified as LPUAP) is one of the most important problems to be …
RBAC administration in distributed systems
Large and distributed access control systems are increasingly common, for example in
health care. In such settings, access control policies may become very complex, thus …
health care. In such settings, access control policies may become very complex, thus …