- 1.A. Albano, G. Ghelli, and R. Orsini. Fibonacci: A Programming Language for Object Databases. VLDB Journal, 4(3):403-444, 1995. Google ScholarDigital Library
- 2.C.W. Bachman and M. Daya. The role concept in data models. In Proceedings of the Third International Conference on Very La~ye Databases, pages 464-476, 1977.Google Scholar
- 3.E. Bertino, C. Bettini, E. Ferrari, and P. Samarati. Supporting periodic authorizatiolm and temporal reasoning in database access control. In Precedings of the 22nd VLDB Conference, 1996. Google ScholarDigital Library
- 4.I).D. Clark and D.R. Wilson. A comparison of commercial and military security policies. In Proceedings of IEEE Symposium on Security and Privacy, pages 184- 194, April 1987.Google ScholarCross Ref
- 5.D. Ferraiolo and R. Kuhn. Role-based access controls. In Proceedings of 15th NIST-NCSC National Computer Security Conference, pages 554-563, October 1992.Google Scholar
- 6.G. Gottlob, M. Schrefl, and B. Rock. Extending Object- Oriented Systenm with Roles. A CM Transactions on lnfo~wmtion Sy.stems, July 1996. Google ScholarDigital Library
- 7.G. Kappel et al. Workflow Management Based on Objects, Rules, and Roles. BuUetin of the 7~chnical Committee on Data Engineering, 18(1):11-18, March 1995.Google Scholar
- 8.P.A. Karger. Implementing commercial data integrity with secure capabilities. In Proceedings of 1EEE Symposium on Security and Privacy, pages 130-139, April 1988.Google ScholarCross Ref
- 9.F.M. Lain, H.L. Chau, and R.K. Wong. An efficient indexing scheme for objects with roles. In Proceedings of 15th British National Conference on Databases, July 1997. Google ScholarDigital Library
- 10.T.M.P. Lee. Using mandatory integrity to enfore com- Security and Privacy, pages 140-146, April 1988.Google Scholar
- 11.H. Lieberinan. Using prototypical objects to implenmnt shared behavior in object-oriented systems. In N. Meyrowitz, editor, Object-Oriented Prog~umming: Systems, Languages and Applications, pages 214-223, October 1986. Google ScholarDigital Library
- 12.A. Montanari, E. Peressi, and B. Pernici. Object migration in temporal object-oriented databases. Informatica, 18:467-484, 1994.Google Scholar
- 13.M. Nyanchama and S.L. Osborn. Role-based security, object-oriented databases ~z separation of duty. A CM SIGMOD Record, 22(4):45--51, December 1993. Google ScholarDigital Library
- 14.B. Pernici. Objects with roles, in IEEE/ACM Conference on Office information System.s, Cambridge, Mass., 1990. Google ScholarDigital Library
- 15.F. Rabitti, E. Bertino, W. Kim, and D. Woelk. A model of authorization for next-generation database systems. A CM Transactions on Database Systems, 16(1), March 1991. Google ScholarDigital Library
- 16.J. Richardson and P. Schwartz. Aspects: Extending objects to support multiple, independent roles. In ACM- SIGMOD International Conference on Management of Data, pages 298-307, Denver, Colorado, May 1991. ACM SIGM()D Record, Vol. 20. Google ScholarDigital Library
- 17.R. Sandhu. Separation of duties in computerized information systems. {n S. Jajodia and C.E. Landwehr, editors, Database Security IV: Status ~ Prospects, pages 179-189. North-Ilolland, 1992.Google Scholar
- 18.R.S. Sandhu, E.J. Coyne, H.I,. Feinstein, and C.E. Youman. Role-based access control: A multidimensional view. In Proceedings of l Oth Annual Computer Security Applications Conference, pages 54-62, December 1994.Google ScholarCross Ref
- 19.E. Sciore. Object Specialization. A CM T~un.saction~ on Information Systems, 7(2):103-122, April 1989. Google ScholarDigital Library
- 20.D.J. Thonmen. Role-based application design and enforcement. In S. dajodia and C.E. Landwehr, editors, Database Security IV: Status ~~ Prospects, pages 151. 168. North-Holland, 1992.Google Scholar
- 21.T.C. Ting, S.A. Dermurjan, and M.Y. Hu. Requiremeats capabilities and functionalities of user-role based security for an object-oriented design model. In C.E. Landwehr and S. Jajodia, editors, Database Sex:uT~ty V: Status ~ Prospects, pages 275-296. North-Holland, 1992. Google ScholarDigital Library
- 22.R.K. Wong, H.L. Chau, and F.H. Lochovsky. A Data Model and Semantics of Objects with Dynamic Roles. In IEEE International Conference on Data Engineering, Apri} 1997. Google ScholarDigital Library
Index Terms
- RBAC support in object-oriented role databases
Recommendations
DW-RBAC: A formal security model of delegation and revocation in workflow systems
One reason workflow systems have been criticized as being inflexible is that they lack support for delegation. This paper shows how delegation can be introduced in a workflow system by extending the role-based access control (RBAC) model. The current ...
A delegation model for extended RBAC
In the field of access control, delegation is an important aspect that is considered part of the administration mechanism. Thus, a comprehensive access control model must provide a flexible administration model to manage delegation and revocation. ...
Comments