Entry Nyanchama:1999:RGM from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Nyanchama:1999:RGM,
  author =       "Matunda Nyanchama and Sylvia Osborn",
  title =        "The role graph model and conflict of interest",
  journal =      j-TISSEC,
  volume =       "2",
  number =       "1",
  pages =        "3--33",
  month =        feb,
  year =         "1999",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Tue Jul 27 17:35:45 MDT 1999",
  bibsource =    "http://www.acm.org/tissec/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/tissec/1999-2-1/p3-nyanchama/",
  abstract =     "We describe in more detail than before the reference
                 model for role-based access control introduced by
                 Nyanchama and Osborn, and the role-graph model with its
                 accompanying algorithms, which is one way of
                 implementing role-role relationships. An alternative
                 role insertion algorithm is added, and it is shown how
                 the role creation policies of Fernandez et al.
                 correspond to role addition algorithms in our model. We
                 then use our reference model to provide a taxonomy for
                 kinds of conflict. We then go on to consider in some
                 detail privilege-privilege and role-role conflicts in
                 conjunction with the role graph model. We show how
                 role-role conflicts lead to a partitioning of the role
                 graph into nonconflicting collections that can together
                 be safely authorized to a given user. Finally, in an
                 appendix, we present the role graph algorithms with
                 additional logic to disallow roles that contain
                 conflicting privileges.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "algorithms; management; security",
  subject =      "{\bf D.4.6} Software, OPERATING SYSTEMS, Security and
                 Protection, Access controls. {\bf K.6.5} Computing
                 Milieux, MANAGEMENT OF COMPUTING AND INFORMATION
                 SYSTEMS, Security and Protection. {\bf G.2.2}
                 Mathematics of Computing, DISCRETE MATHEMATICS, Graph
                 Theory, Graph algorithms.",
}

Related entries