A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Analyzing and Managing Role-Based Access Control Policies
2008
IEEE Transactions on Knowledge and Data Engineering
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to various domains such as health care industry, digital government, and financial service institutes requiring that different security requirements must be fulfilled. Authorization constraints can help the policy architect design and express higher-level organizational rules. Although the importance of authorization
doi:10.1109/tkde.2008.28
fatcat:xw6fk4t3xzelvgiyiifgpbge7a