skip to main content
10.1145/319171.319173acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article
Free Access

Role-based access control on the Web using Java

Published:28 October 1999Publication History
First page image

References

  1. BAL97.Balfanz D., Gong L., "Experience with Secure Multi-Processing in Java", Technical Report 560-97, Department of Computer Science, Princeton University, September, 1997.Google ScholarGoogle Scholar
  2. BER94.Bertino E., Origgi F., Samarati P., "A New Authorization Model for Object-Oriented Databases", in Proceedings of the IFIP WG 11.3 Eight Annual Working Conference on Database Security, August 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. BER97.Bertino E., Ferrari E., Atluri V., "A Flexible Model Supporting the Specification and Enforcement of Role-based Authorizations in Workflow Management Systems", in Proceedings of Second ACM Workshop on Role-Based Access Control, ACM Press, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. FER99.Ferraiolo D. F., Barkley J. F., Kuhn D. R., "A Role Based Access Control Model and Reference Implementation within a Corporate Intranet", ACM Transactions on Information and System Security, Volume 2, Number 1, February 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. GIU96.Giuri L., Iglio P., "A Formal Model For Role- Based Access Control with Constraints", in Proceedings of 9~' IEEE Computer Security Foundation Workshop, County Kerry, Ireland, June 10-12, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. GIU98a.Giuri L., "An extension of the SQL/3 security model for a better support of role-based access control", Document ISO/IEC JTCI/SC21 WG3/DBL, n. CWB013, f tp : / / j erry. ece. umassd, edu/isowg3/db i/CWBdoc s/cwb0 13 .pdf.Google ScholarGoogle Scholar
  7. GIU98b.Giuri L., "Role-Based Access Control in Java", in Proceedings of Third ACM Workshop on Role-Based Access Control, ACM Press, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. GON98.Gong L., "JavaTM Security Architecture (JDK 1.2)", draft document (revision 0.8), Sun Microsystems Inc., March 9, 1998.Google ScholarGoogle Scholar
  9. JAA99.Java Authentication and Authorization Service, http: //www. javasoft, com/security/jaas/.Google ScholarGoogle Scholar
  10. JAE95.Jaeger T., Prakasb A., "Requirements of Rolebased Access Control for Collaborative Systems", in Proceedings of First ACM Workshop on Role-Based Access Control, ACM Press, 1996 Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. MAR97.Martin D. M., Rajagopalan S., Rubin A. D., "Blocking Java Applets at the Firewall", in Proceedings of IEEE Symposium on Network and Distributed System Security, IEEE Computer Society Press, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. MCG97.McGraw G., Felten W. F., Java Security: Hostile Applets, Holes and Antidotes, Jon Wiley & Sons, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. MEH98.Mehta N., "Expanding and Extending the Security Features of Java", 7th USENIX Security Symposium Proceedings, San Antonio (Texas), Jan 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. SAN96.Sandhu R. S., Coyne E. J., Feinstein H., Youman C. E., "Role-Based Access Control Models", ACM Computer, Vol. 29, No. 2, February 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. SER99.Java Servlet API, http: //www. javasoft, corn /products / servlet /Google ScholarGoogle Scholar
  16. SQL99.Jim Melton (ed.), "ISO Final Draft International Standard (FDIS) Database Language SQL- Part 2: Foundation (S QL/Foundation)", ISO/IEC JTCltSC32 N00223Google ScholarGoogle Scholar
  17. WAL97.Wallach D. S., Balfanz D., Dean D., Felten E. W., "Extensible Security Architectures for Java", in Proceedings of 16'h Symposium on Operating System Principles, Saint-Malo, France, October 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. WAL98.Wallach D. S., Felten E. W., "Understanding Java Stack Inspection", in Proceedings of 1998 IEEE Symposium on Security and Privacy, Oakland, CA, May 1998.Google ScholarGoogle Scholar
  19. WAL99.Wallach D. S., "A New Approach to Mobile Code Security", Ph.D. dissertation, January 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Role-based access control on the Web using Java

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            RBAC '99: Proceedings of the fourth ACM workshop on Role-based access control
            October 1999
            160 pages
            ISBN:1581131801
            DOI:10.1145/319171

            Copyright © 1999 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 28 October 1999

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Upcoming Conference

            SACMAT 2024

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader