Please use this identifier to cite or link to this item:
https://hdl.handle.net/1959.11/11854
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Evered, Mark P | en |
dc.date.accessioned | 2013-01-09T15:32:00Z | - |
dc.date.issued | 2012 | - |
dc.identifier.citation | Proceedings of the International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), p. 128-132 | en |
dc.identifier.isbn | 9781467314244 | en |
dc.identifier.uri | https://hdl.handle.net/1959.11/11854 | - |
dc.description.abstract | Role-based access control (RBAC) has gained popularity for the expression of access constraints in information systems but existing RBAC models do not provide sufficient expressive power to support the kinds of fine-grained access control often required. In this paper, we define a new formal model for RBAC which supports controlled role appointment and transitions, object attributes analogous to subject roles and a transitive role/attribute derivation relationship. | en |
dc.language | en | en |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en |
dc.relation.ispartof | Proceedings of the International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) | en |
dc.title | A Transitive Access Control Model for Dynamic Roles and Attributes | en |
dc.type | Conference Publication | en |
dc.relation.conference | CyberSec 2012: International Conference on Cyber Security, Cyber Warfare and Digital Forensic | en |
dc.identifier.doi | 10.1109/CyberSec.2012.6246105 | en |
dc.subject.keywords | Computer System Security | en |
local.contributor.firstname | Mark P | en |
local.subject.for2008 | 080303 Computer System Security | en |
local.subject.seo2008 | 890202 Application Tools and System Utilities | en |
local.profile.school | School of Science and Technology | en |
local.profile.email | mevered@une.edu.au | en |
local.output.category | E1 | en |
local.record.place | au | en |
local.record.institution | University of New England | en |
local.identifier.epublicationsrecord | une-20121220-151124 | en |
local.date.conference | 26th - 28th June, 2012 | en |
local.conference.place | Kuala Lumpur, Malaysia | en |
local.publisher.place | Los Alamitos, United States of America | en |
local.format.startpage | 128 | en |
local.format.endpage | 132 | en |
local.identifier.scopusid | 84866726889 | en |
local.peerreviewed | Yes | en |
local.contributor.lastname | Evered | en |
dc.identifier.staff | une-id:mevered | en |
local.profile.role | author | en |
local.identifier.unepublicationid | une:12056 | en |
dc.identifier.academiclevel | Academic | en |
local.title.maintitle | A Transitive Access Control Model for Dynamic Roles and Attributes | en |
local.output.categorydescription | E1 Refereed Scholarly Conference Publication | en |
local.conference.details | CyberSec 2012: International Conference on Cyber Security, Cyber Warfare and Digital Forensic, Kuala Lumpur, Malaysia, 26th - 28th June, 2012 | en |
local.search.author | Evered, Mark P | en |
local.uneassociation | Unknown | en |
local.year.published | 2012 | en |
local.subject.for2020 | 460499 Cybersecurity and privacy not elsewhere classified | en |
local.subject.seo2020 | 220499 Information systems, technologies and services not elsewhere classified | en |
local.date.start | 2012-06-26 | - |
local.date.end | 2012-06-28 | - |
Appears in Collections: | Conference Publication School of Science and Technology |
Files in This Item:
File | Description | Size | Format |
---|
Page view(s)
1,224
checked on May 12, 2024
Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.