λ-RBAC: Programming with role-based access control

1Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We study mechanisms that permit program components to express role constraints on clients, focusing on programmatic security mechanisms, which permit access controls to be expressed, in situ, as part of the code realizing basic functionality. In this setting, two questions immediately arise: - The user of a component faces the issue of safety, is a particular role sufficient to use the component? - The component designer faces the dual issue of protection: is a particular role demanded in all execution paths of the component? We provide a formal calculus and static analysis to answer both questions. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Jagadeesan, R., Jeffrey, A., Pitcher, C., & Riely, J. (2006). λ-RBAC: Programming with role-based access control. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4052 LNCS, pp. 456–467). Springer Verlag. https://doi.org/10.1007/11787006_39

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free