skip to main content
10.1145/319171.319180acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article
Free Access

RBAC in UNIX administration

Published:28 October 1999Publication History
First page image

References

  1. 1.Role-Based Access Control Protection Profile, Common Criteria, July 30, 1998Google ScholarGoogle Scholar
  2. 2.Decentralized Group Hierarchies in UNIX: An Experiment and Lessons Learned, R. Sandhu & G Ahn, In Proceedings of 21st NIST-NCSC National Information Systems Security Conference, pages 486-502Google ScholarGoogle Scholar
  3. 3.Role-Based Access Control (RBAC): Features and Motivations, David Ferraiolo et al., Computer Security Applications Conference, 1995Google ScholarGoogle Scholar
  4. 4.A Role Based Access Control Model and Reference Implementation within a Corporate Internet. David E Ferraiolo, John F. Barkley, and D. Richard Kuhn, ACM Transactions on Information Systems Security, Volume 1, Number 2, February 1999, National Institute of Standards and Technology Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.Role-Based Access Control In Commercial Database Management Systems, D.F and D.R. Kuhn, In Proceedings of 21st NIST-NCSC National Information Systems Security Conference, pages 503-511Google ScholarGoogle Scholar
  6. 6.Java Authentication and Authorization Service, http:I/java.sun.com/security/jaas, April 13, 1999.Google ScholarGoogle Scholar
  7. 7.Specifying and Managing Role-Based Access Control within a Corporate Intranet, Ferraiolo, Barkley, 1997, Second ACM Workshop on Role-Based Access Control, 1997 Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.X/Open Single Sign-on Service (XSSO) - Pluggable Authentication Modules, August 5, 1998Google ScholarGoogle Scholar
  9. 9.Inheritance Properties of Role Hierarchies, W. Jansen, In Proceedings of 21st NIST-NCSC National information Systems Security Conference, pages 476-485.Google ScholarGoogle Scholar

Index Terms

  1. RBAC in UNIX administration

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          RBAC '99: Proceedings of the fourth ACM workshop on Role-based access control
          October 1999
          160 pages
          ISBN:1581131801
          DOI:10.1145/319171

          Copyright © 1999 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 28 October 1999

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader