Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available
(no registration required)

(270.55KB)


-- CSC-OpenAccess Policy
-- Creative Commons Attribution NonCommercial 4.0 International License
>> COMPLETE LIST OF JOURNALS

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria
Delegation in Role Based Access Control Model for Workflow Systems
Prasanna H Bammigatti , P R Rao
Pages - 1 - 10     |    Revised - 15-4-2008     |    Published - 30-4-2008
Published in International Journal of Computer Science and Security (IJCSS)
Volume - 2   Issue - 2    |    Publication Date - April 2008  Table of Contents
MORE INFORMATION
References   |   Cited By (5)   |   Abstracting & Indexing
KEYWORDS
ABSTRACT
Role -based access control (RBAC) has been introduced in the last few years, and offers a powerful means of specifying access control decisions. The model of RBAC usually assumes that, if there is a role hierarchy then access rights are inherited upwards through the hierarchy. In organization workflow the main threat is of access control. The Role based access control is one of the best suitable access control model one can think of. It is not only the role hierarchies but also other control factors that affect the access control in the workflow. The paper discusses the control factors and role hierarchies in workflow and brings a new model of RBAC. This paper also over comes the conflicts and proves that the system is safe by applying the new model to the workflow
CITED BY (5)  
1 Mohy, N. N., Mokhtar, H. M., & El-Sharkawi, M. E. (2015, July).Delegation enabled provenance-based access control model. In Science and Information Conference (SAI), 2015 (pp. 1374-1379). IEEE.
2 Ahmad, A. (2013).A model of distributed rights allocation in online social interaction: a thesis presented in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology at Massey University, Albany, Auckland, New Zealand (Doctoral dissertation).
3 H. J. Hsu and F. J. Wang, “A Delegation Framework for Task-Role Based Access Control in WFMS”, Journal of Information Science and Engineering, 27, pp. 1011-1028, 2011.
4 Xu arms, & Wang Fengjian.( 2010 )A timing workflow management systems research (Doctoral dissertation) analysis.
5 S. Gkarafli and A. A. Economides, “Comparing The Proof By Knowledge Authentication Techniques”, International Journal of Computer Science and Security (IJCSS), 4(2) pp. 149-264, 2010.
ABSTRACTING & INDEXING
1 Google Scholar 
2 Academic Journals Database 
3 ScientificCommons 
4 Academic Index 
5 CiteSeerX 
6 iSEEK 
7 Socol@r  
8 ResearchGATE 
9 Libsearch 
10 Bielefeld Academic Search Engine (BASE) 
11 Scribd 
12 WorldCat 
13 SlideShare 
14 PDFCAST 
15 PdfSR 
REFERENCES
Bertino, E., Damiani et al., “GEO-RBAC: A Spatially Aware RBAC”. in 10th Symposium on Access Control Models and Technologies (SACMAT'05), (2005).
Clark, D.C. and D.R. Wilson. “A Comparison of Commercial and Military Computer Security Policies.” in IEEE Symposium on Security and Privacy. 1987. Oakland, CA: IEEE Computer Society Press.
E. Cohen, R. K. Thomas, W. Winsborough and D. Shands. “Models for Coalition-based Access Control (CBAC)” Seventh ACM Symposium on Access Control Models and Technologies. 2002, Monterey, California, USA
Jonathan D. Moffett., “Control Prnciples and Role Hierarchies” in Proc of 3rd ACM Workshop on RBAC oct 1998 No. 3, August 2001, pp. 224-274.
Joshi, J.B.D., Bertino, E., et al.,. “A generalized temporal role-based access control model” IEEE Transactions on Knowledge and Data Engineering, 17 (1). 4-23, 2005
Moffett, J.D. and M.S. Sloman, “Delegation of Authority, in Integrated Network Management II, I” Krishnan and W. Zimmer, Editors. 1991, North Holland. p. 595-606
P. Vieira, and A. Rito-Silva, “Work Analysis Refinement Modeling”, INESC-ID Technical Report, 2003.
Prasanna H B, P R Rao “GenericWA-RBAC: Role Based Access Control Model for Web Applications” IEEE Conference ICIT Dec 2006
Sandhu, R.S., et al., “Role-Based Access Control Models.” IEEE Computer, 1996. 29(2): p. 38-48.
Ting, T.C., “A User-Role Based Data Security Approach, in Database Security: Status and Prospects,” C.E. Landwehr, Editor. 1988, Elsevier.
MANUSCRIPT AUTHORS
Dr. Prasanna H Bammigatti
Department of Computer Science and Engineering - India
prasannahb@gmail.com
Mr. P R Rao
Department of Computer Science and Technology - India


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS
 
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions