Delegation in role-based access control

J Crampton, H Khambhammettu - International Journal of Information …, 2008 - Springer
User delegation is a mechanism for assigning access rights available to one user to another
user. A delegation can either be a grant or transfer operation. Existing work on delegation in …

DW-RBAC: A formal security model of delegation and revocation in workflow systems

J Wainer, A Kumar, P Barthelmess - Information Systems, 2007 - Elsevier
One reason workflow systems have been criticized as being inflexible is that they lack
support for delegation. This paper shows how delegation can be introduced in a workflow …

Analyzing and managing role-based access control policies

K Sohr, M Drouineaud, GJ Ahn… - IEEE transactions on …, 2008 - ieeexplore.ieee.org
Today more and more security-relevant data is stored on computer systems; security-critical
business processes are mapped to their digital counterparts. This situation applies to …

A mechanism to resolve the unauthorized access vulnerability caused by permission delegation in blockchain-based access control

J Shi, R Li, W Hou - IEEE Access, 2020 - ieeexplore.ieee.org
Permission delegation in access control provides the subject with a second method to obtain
object permissions in addition to permission granting. It is especially applicable when the …

Delegation in role-based access control

J Crampton, H Khambhammettu - Computer Security–ESORICS 2006 …, 2006 - Springer
User delegation is a mechanism for assigning access rights available to a user to another
user. A delegation operation can either be a grant or transfer operation. Delegation for role …

Capability-based delegation model in RBAC

K Hasebe, M Mabuchi, A Matsushita - … of the 15th ACM symposium on …, 2010 - dl.acm.org
For flexible and dynamic resource management in environments where users collaborate to
fulfill their common tasks, various attempts at modeling delegation of authority have been …

Design and implementation of a secure and flexible access-right delegation for resource constrained environments

T Rabehaja, S Pal, M Hitchens - Future Generation Computer Systems, 2019 - Elsevier
With the emergence of the Internet of Things (IoT) technology, devices are becoming more
ubiquitous and openly accessible to the users. Commonly, IoT devices are constrained in …

Enterprise level security: securing information systems in an uncertain world

WR Simpson - Communications of the ACM, 2016 - api.taylorfrancis.com
Preface is book has been derived from 14 years of research, pilots, and operational trials in
putting together an enterprise system. e later chapters (8 through 22) contain information …

Handling least privilege problem and role mining in RBAC

H Huang, F Shang, J Liu, H Du - Journal of Combinatorial Optimization, 2015 - Springer
For a given role-based access control (RBAC) configuration, user-role assignment satisfying
least privilege principle (specified as LPUAP) is one of the most important problems to be …

RBAC administration in distributed systems

MAC Dekker, J Crampton, S Etalle - … of the 13th ACM symposium on …, 2008 - dl.acm.org
Large and distributed access control systems are increasingly common, for example in
health care. In such settings, access control policies may become very complex, thus …