Abstract
Role-based access control provides very flexible mechanisms for managing access control in complex systems. The role graph model of Nyanchama and Osborn is one example of how role administration can be implemented. In previous research, we have shown how the access control information of existing systems can be mapped to a role graph. In this paper, we extend this research by showing how, when two systems are being integrated, their role graphs can also be integrated. © 2002 Kluwer Academic Publishers.
Author supplied keywords
Cite
CITATION STYLE
Osborn, S. (2001). Database security integration using role-based access control. In IFIP Advances in Information and Communication Technology (Vol. 73, pp. 245–258). Springer New York LLC. https://doi.org/10.1007/0-306-47008-x_22
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.