Skip to main content

A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications

  • Conference paper
  • First Online:
Book cover Information and Communications Security (ICICS 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2229))

Included in the following conference series:

  • 592 Accesses

Abstract

Access control is concerned with limiting the activity of legitimate users in an application. Role-based access control (RBAC) uses role to indirectly describe the access rights. This indirectly mapping is very flexible. However, current RBAC models are not suitable to describe fine-grained access control for data-centric enterprise applications. In this paper, we present a pragmatic role-based access control model for data-centric application. The access control is fine-grained and flexible. An object-oriented implementation is also presented. Users are identified by digital certificates. The proposed model is designed for three-tier enterprise application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. S. Sandhu, E. J. Coyne: Role-Based Access Control Models, IEEE Computer, February 1996, pp. 38–47.

    Google Scholar 

  2. S. Sandhu, et al.: Role-Based Access Control: A Multi-Dimensional View, Proceedings of Annual Computer Security Applications Conference, 1994.

    Google Scholar 

  3. D. Ferraiolo, J. Barkley, et.al: A Role-Based Access Control Model and Reference Implementation Within a Corporate Intranet, ACM Transactions on Information and System Security, Vol. 2, No. 1, February 1999, pp. 34–64.

    Article  Google Scholar 

  4. J. Park, R. Sandhu: Binding Identities and Attributes Using Digitally Signed Certificates, Proceedings of Annual Computer Security Applications Conference, 2000.

    Google Scholar 

  5. J. Feghhi, et al.: Digital Certificates — Applied Internet Security, Addison-Wesley, 1999.

    Google Scholar 

  6. M. Goncalves: Firewalls Complete, McGraw-Hill, 1998.

    Google Scholar 

  7. R. Sandhu: Authentication, Access Control, and Audit, ACM Computing Surveys, Vol. 28, No. 1, March 1996, pp. 241–243.

    MathSciNet  Google Scholar 

  8. CORBA: The Common Object Request Broker Architecture: Architecture and Specification 2.0 and 3.0, available at: http://www.omg.org.

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, D., Lukhaub, H., Zorn, W. (2001). A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications. In: Qing, S., Okamoto, T., Zhou, J. (eds) Information and Communications Security. ICICS 2001. Lecture Notes in Computer Science, vol 2229. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45600-7_35

Download citation

  • DOI: https://doi.org/10.1007/3-540-45600-7_35

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42880-0

  • Online ISBN: 978-3-540-45600-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics