UC-RBAC: A usage constrained role-based access control model

7Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Role-based access control (RBAC) models have received broad support as a generalized approach to access control. However, there are requirements to limit the maximum number of usage times of roles assigned to users, that cannot be modeled under current RBAC models. We present UC-RBAC model, an extended RBAC model, to tackle such dynamic aspects. UC-RBAC supports such constraints during periodic time. The constraints can be set to limit the usage of a role of both a specified user and all users assigned to the role. The formal definition and semantics of the model are presented. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Xu, Z., Feng, D., Li, L., & Chen, H. (2003). UC-RBAC: A usage constrained role-based access control model. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2836, 337–347. https://doi.org/10.1007/978-3-540-39927-8_31

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free