Entry Li:2006:SAR from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Li:2006:SAR,
  author =       "Ninghui Li and Mahesh V. Tripunitara",
  title =        "Security analysis in role-based access control",
  journal =      j-TISSEC,
  volume =       "9",
  number =       "4",
  pages =        "391--420",
  month =        nov,
  year =         "2006",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1187441.1187442",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Jun 12 17:51:51 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "The administration of large role-based access control
                 (RBAC) systems is a challenging problem. In order to
                 administer such systems, decentralization of
                 administration tasks by the use of delegation is an
                 effective approach. While the use of delegation greatly
                 enhances flexibility and scalability, it may reduce the
                 control that an organization has over its resources,
                 thereby diminishing a major advantage RBAC has over
                 discretionary access control (DAC). We propose to use
                 security analysis techniques to maintain desirable
                 security properties while delegating administrative
                 privileges. We give a precise definition of a family of
                 security analysis problems in RBAC, which is more
                 general than safety analysis that is studied in the
                 literature. We show that two classes of problems in the
                 family can be reduced to similar analysis in the
                 RT[$\leftarrow,\cap$] role-based trust-management
                 language, thereby establishing an interesting
                 relationship between RBAC and the RT framework. The
                 reduction gives efficient algorithms for answering most
                 kinds of queries in these two classes and establishes
                 the complexity bounds for the intractable cases.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "delegation; role-based access control; role-based
                 administration; trust management",
}

Related entries