Database security integration using role-based access control

11Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Role-based access control provides very flexible mechanisms for managing access control in complex systems. The role graph model of Nyanchama and Osborn is one example of how role administration can be implemented. In previous research, we have shown how the access control information of existing systems can be mapped to a role graph. In this paper, we extend this research by showing how, when two systems are being integrated, their role graphs can also be integrated. © 2002 Kluwer Academic Publishers.

Cite

CITATION STYLE

APA

Osborn, S. (2001). Database security integration using role-based access control. In IFIP Advances in Information and Communication Technology (Vol. 73, pp. 245–258). Springer New York LLC. https://doi.org/10.1007/0-306-47008-x_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free