Skip to main content

Role-Based Access Control

  • Reference work entry
  • First Online:
Book cover Encyclopedia of Database Systems

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 4,499.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 6,499.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Ahn G, Sandhu R. Role-based authorization constraints specification. ACM Trans Inf Syst Secur. 2000;3(4):207–26.

    Article  Google Scholar 

  2. American National Standard for Information Technology (ANSI). Role based access control. ANSI INCITS 359-2004, February 2004.

    Google Scholar 

  3. Bertino E, Bonatti PA, Ferrari E. TRBAC: a temporal role-based access control model. ACM Trans Inf Syst Secur. 2001;4(3):191–233.

    Article  Google Scholar 

  4. Bertino E, Catania B, Damiani ML, Perlasca P. GEO-RBAC: a spatially aware RBAC. In: Proceedings of the 10th ACM Symposium on Access Control Models and Technologies; 2005. p. 29–37.

    Google Scholar 

  5. Chandran SM, Joshi JBD. LoT RBAC: a location and time-based RBAC model. In: Proceedings of the 6th International Conference on Web Information Systems Engineering; 2005. p. 361–75.

    Google Scholar 

  6. Crampton J, Loizou G. Administrative scope: a foundation for role-based administrative models. ACM Trans Inf Syst Secur. 2003;6(2):201–31.

    Article  Google Scholar 

  7. Joshi JBD, Bertino E, Latif U, Ghafoor A. A generalized temporal role-based access control model. IEEE Trans Knowl Data Eng. 2005;17(1): 4–23.

    Article  Google Scholar 

  8. Joshi JBD, Shafiq B, Ghafoor A, Bertino E. Dependencies and separation of duty constraints in GTRBAC. In: Proceedings of the 8th ACM Symposium on Access Control Models and Technologies; 2003. p. 51–64.

    Google Scholar 

  9. Nyanchama M, Osborn SL. The role graph model. In: Proceedings of the 1st ACM Workshop on Role-Based Access Control; 1995.

    Google Scholar 

  10. Osborn S, Sandhu R, Munawer Q. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans Inf Syst Secur. 2000;3(2):85–106.

    Article  Google Scholar 

  11. Piromruen S, Joshi JBD. An RBAC framework for time constrained secure interoperation in multi-domain environment. In: Proceedings of the IEEE Workshop on Object-oriented Real-time Dependable Systems; 2005. p. 36–45.

    Google Scholar 

  12. Sandhu RS, Coyne EJ, Feinstein HL, Youman CE. Role-based access control models. IEEE Comput. 1996;29(2):38–47.

    Article  Google Scholar 

  13. Sandhu R, Bhamidipati V, Munawer Q. The ARBAC97 model for role-based administration of roles. ACM Trans Inf Syst Secur. 1999;2(1): 105–35.

    Article  Google Scholar 

  14. Shafiq B, Joshi JBD, Bertino E, Ghafoor A. Secure interoperation in a multi-domain environment employing RBAC policies. IEEE Trans Knowl Data Eng. 2005;17(11):1557–77.

    Article  Google Scholar 

  15. Zhang L, Ahn G, Chu B. A role-based delegation framework for healthcare information systems. In: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies; 2002. p. 125–34.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Yue Zhang or James B. D. Joshi .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Science+Business Media, LLC, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Zhang, Y., Joshi, J.B. (2018). Role-Based Access Control. In: Liu, L., Özsu, M.T. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8265-9_320

Download citation

Publish with us

Policies and ethics