Entry Ferraiolo:1999:RBA from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Ferraiolo:1999:RBA,
  author =       "David F. Ferraiolo and John F. Barkley and D. Richard
                 Kuhn",
  title =        "A role-based access control model and reference
                 implementation within a corporate intranet",
  journal =      j-TISSEC,
  volume =       "2",
  number =       "1",
  pages =        "34--64",
  month =        feb,
  year =         "1999",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Tue Jul 27 17:35:45 MDT 1999",
  bibsource =    "http://www.acm.org/tissec/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/tissec/1999-2-1/p34-ferraiolo/",
  abstract =     "This paper describes NIST's enhanced RBAC model and
                 our approach to designing and implementing RBAC
                 features for networked Web servers. The RBAC model
                 formalized in this paper is based on the properties
                 that were first described in Ferraiolo and Kuhn [1992]
                 and Ferraiolo et al. [1995], with adjustments resulting
                 from experience gained by prototype implementations,
                 market analysis, and observations made by Jansen [1988]
                 and Hoffman [1996]. The implementation of RBAC for the
                 Web (RBAC/Web) provides an alternative to the
                 conventional means of administering and enforcing
                 authorization policy on a server-by-server basis.
                 RBAC/Web provides administrators with a means of
                 managing authorization data at the enterprise level, in
                 a manner consistent with the current set of laws,
                 regulations, and practices.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "security; standardization",
  subject =      "{\bf C.2.4} Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.
                 {\bf C.2.5} Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Local and Wide-Area
                 Networks. {\bf D.4.6} Software, OPERATING SYSTEMS,
                 Security and Protection, Access controls. {\bf D.4.7}
                 Software, OPERATING SYSTEMS, Organization and Design,
                 Distributed systems.",
}

Related entries