Key points are not available for this paper at this time.
Security administration of large systems is complex, but it can be simplified by a role-based access control approach. This article explains why RBAC is receiving renewed attention as a method of security administration and review, describes a framework of four reference models developed to better understand RBAC and categorizes different implementations, and discusses the use of RBAC to manage itself.
Building similarity graph...
Analyzing shared references across papers
Loading...
Sandhu et al. (Mon,) studied this question.
www.synapsesocial.com/papers/69d95f1104deaa6ab5684251 — DOI: https://doi.org/10.1109/2.485845
Ravi Sandhu
Edward J. Coyne
H.L. Feinstein
Computer
George Mason University
Building similarity graph...
Analyzing shared references across papers
Loading...