Issues in the design of a language for role based access control

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

7 Citations (Scopus)

Abstract

In this paper, we describe a language based approach to the specification of authorisation policies that can be used to support the range of access control policies in commercial object systems. We discuss the issues involved in the design of a language for role based access control systems. The notion of roles is used as a primitive construct within the language. This paper describes the basic constructs of the language and the language is used to specify several access control policies such as role based access control, static and dynamic separation of duty, delegation as well as joint action based access policies. The language is flexible and is able to capture meta-level operations and it is often these features which are significant when it comes to the applicability of an access control system to practical real situations.

Original languageEnglish
Title of host publicationInformation and Communication Security
Subtitle of host publicationSecond International Conference, ICICS’99, Sydney, Australia, November 9-11, 1999. Proceedings
EditorsVijay Varadharajan, Yi Mu
Place of PublicationBerlin
PublisherSpringer, Springer Nature
Pages22-38
Number of pages17
ISBN (Electronic)9783540479420
ISBN (Print)9783540666820
DOIs
Publication statusPublished - 1999
Externally publishedYes
Event2nd International Conference on Information and Communication Security, ICICS - 1999 - Sydney, Australia
Duration: 9 Nov 199911 Nov 1999

Publication series

NameLecture Notes in Computer Science
PublisherSpringer Berlin Heidelberg
Volume1726
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other2nd International Conference on Information and Communication Security, ICICS - 1999
Country/TerritoryAustralia
CitySydney
Period9/11/9911/11/99

Fingerprint

Dive into the research topics of 'Issues in the design of a language for role based access control'. Together they form a unique fingerprint.

Cite this