Abstract
Access control is concerned with limiting the activity of legitimate users in an application. Role-based access control (RBAC) uses role to indirectly describe the access rights. This indirectly mapping is very flexible. However, current RBAC models are not suitable to describe fine-grained access control for data-centric enterprise applications. In this paper, we present a pragmatic role-based access control model for data-centric application. The access control is fine-grained and flexible. An object-oriented implementation is also presented. Users are identified by digital certificates. The proposed model is designed for three-tier enterprise application.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
S. Sandhu, E. J. Coyne: Role-Based Access Control Models, IEEE Computer, February 1996, pp. 38–47.
S. Sandhu, et al.: Role-Based Access Control: A Multi-Dimensional View, Proceedings of Annual Computer Security Applications Conference, 1994.
D. Ferraiolo, J. Barkley, et.al: A Role-Based Access Control Model and Reference Implementation Within a Corporate Intranet, ACM Transactions on Information and System Security, Vol. 2, No. 1, February 1999, pp. 34–64.
J. Park, R. Sandhu: Binding Identities and Attributes Using Digitally Signed Certificates, Proceedings of Annual Computer Security Applications Conference, 2000.
J. Feghhi, et al.: Digital Certificates — Applied Internet Security, Addison-Wesley, 1999.
M. Goncalves: Firewalls Complete, McGraw-Hill, 1998.
R. Sandhu: Authentication, Access Control, and Audit, ACM Computing Surveys, Vol. 28, No. 1, March 1996, pp. 241–243.
CORBA: The Common Object Request Broker Architecture: Architecture and Specification 2.0 and 3.0, available at: http://www.omg.org.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, D., Lukhaub, H., Zorn, W. (2001). A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications. In: Qing, S., Okamoto, T., Zhou, J. (eds) Information and Communications Security. ICICS 2001. Lecture Notes in Computer Science, vol 2229. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45600-7_35
Download citation
DOI: https://doi.org/10.1007/3-540-45600-7_35
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42880-0
Online ISBN: 978-3-540-45600-1
eBook Packages: Springer Book Archive