{"id":"https://openalex.org/W2170171586","doi":"https://doi.org/10.1145/1229285.1229335","title":"Extended privilege inheritance in RBAC","display_name":"Extended privilege inheritance in RBAC","publication_year":2007,"publication_date":"2007-03-20","ids":{"openalex":"https://openalex.org/W2170171586","doi":"https://doi.org/10.1145/1229285.1229335","mag":"2170171586"},"language":"en","primary_location":{"id":"doi:10.1145/1229285.1229335","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1229285.1229335","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd ACM symposium on Information, computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073872393","display_name":"M.A.C. Dekker","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"M. A. C. Dekker","raw_affiliation_strings":["Security group, TNO ICT, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Security group, TNO ICT, The Netherlands","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081621831","display_name":"Jan Cederquist","orcid":"https://orcid.org/0000-0003-2738-764X"},"institutions":[{"id":"https://openalex.org/I4210154254","display_name":"Instituto Superior de Tecnologias Avan\u00e7adas","ror":"https://ror.org/04hzbg791","country_code":"PT","type":"education","lineage":["https://openalex.org/I4210154254"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"J. G. Cederquist","raw_affiliation_strings":["SQIG-IT, IST, TU Lisbon, Portugal"],"affiliations":[{"raw_affiliation_string":"SQIG-IT, IST, TU Lisbon, Portugal","institution_ids":["https://openalex.org/I4210154254"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109319963","display_name":"Julian M. Crampton","orcid":null},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"J. Crampton","raw_affiliation_strings":["ISG, Royal Holloway, United Kingdom"],"affiliations":[{"raw_affiliation_string":"ISG, Royal Holloway, United Kingdom","institution_ids":["https://openalex.org/I184558857"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052389888","display_name":"Sandro Etalle","orcid":null},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"S. Etalle","raw_affiliation_strings":["University of Twente, The Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5073872393"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.0939,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.94720607,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"383","last_page":"385"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/privilege","display_name":"Privilege (computing)","score":0.928876519203186},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.7498945593833923},{"id":"https://openalex.org/keywords/inheritance","display_name":"Inheritance (genetic algorithm)","score":0.708526611328125},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6581641435623169},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6241412162780762},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5713943243026733},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4929075241088867},{"id":"https://openalex.org/keywords/relation","display_name":"Relation (database)","score":0.4635011553764343},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4502217769622803},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.11705178022384644},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.10762965679168701}],"concepts":[{"id":"https://openalex.org/C2780138299","wikidata":"https://www.wikidata.org/wiki/Q3404265","display_name":"Privilege (computing)","level":2,"score":0.928876519203186},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.7498945593833923},{"id":"https://openalex.org/C2780902518","wikidata":"https://www.wikidata.org/wiki/Q6033780","display_name":"Inheritance (genetic algorithm)","level":3,"score":0.708526611328125},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6581641435623169},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6241412162780762},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5713943243026733},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4929075241088867},{"id":"https://openalex.org/C25343380","wikidata":"https://www.wikidata.org/wiki/Q277521","display_name":"Relation (database)","level":2,"score":0.4635011553764343},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4502217769622803},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.11705178022384644},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.10762965679168701},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":6,"locations":[{"id":"doi:10.1145/1229285.1229335","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1229285.1229335","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd ACM symposium on Information, computer and communications security","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.tue.nl:openaire_cris_publications/e179cfee-e4ac-4dba-9c8b-9c02c3917cb4","is_oa":false,"landing_page_url":"https://research.tue.nl/en/publications/e179cfee-e4ac-4dba-9c8b-9c02c3917cb4","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Dekker, M A C, Cederquist, J G, Crampton, J & Etalle, S 2007, Extended privilege inheritance in RBAC. in F Bao & S Miller (eds), Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security (ASIACCS 2007) 20-22 March 2007, Singapore. Association for Computing Machinery, Inc., New York, pp. 383-385, ASIACCS 2007, Singapore, 20/03/07.","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:ris.utwente.nl:openaire_cris_publications/a40dbdb0-5c6a-4590-95cc-c85ddcb13e2d","is_oa":false,"landing_page_url":"https://research.utwente.nl/en/publications/a40dbdb0-5c6a-4590-95cc-c85ddcb13e2d","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Dekker, M A C, Cederquist, J G, Crampton, J & Etalle, S 2007, Extended Privilege Inheritance in RBAC. in R Deng & P Samarati (eds), Proceedings of the 2nd ACM symposium on Information, computer and communications security, ASIACCS 2007., 10.1145/1229285.1229335, Conference on Computer and Communications Security, no. LNCS4549, ACM Press, New York, pp. 383-385, 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, Singapore, 20/03/07. https://doi.org/10.1145/1229285.1229335","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.tue.nl:publications/e179cfee-e4ac-4dba-9c8b-9c02c3917cb4","is_oa":false,"landing_page_url":"http://doi.acm.org/10.1145/1229285.1229335","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Dekker, M A C, Cederquist, J G, Crampton, J & Etalle, S 2007, Extended privilege inheritance in RBAC. in F Bao & S Miller (eds), Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security (ASIACCS 2007) 20-22 March 2007, Singapore. Association for Computing Machinery, Inc., New York, pp. 383-385, ASIACCS 2007, Singapore, 20/03/07.","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:ris.utwente.nl:publications/a40dbdb0-5c6a-4590-95cc-c85ddcb13e2d","is_oa":false,"landing_page_url":"http://eprints.eemcs.utwente.nl/secure2/10740/01/p383-dekker.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:ris.utwente.nl:publications/df540045-09eb-477a-a5c3-20278ad48c93","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6800000071525574}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1819010326","https://openalex.org/W1997862012","https://openalex.org/W1999514735","https://openalex.org/W2043370600","https://openalex.org/W2066008374","https://openalex.org/W2074963925","https://openalex.org/W2103317919","https://openalex.org/W2124260419","https://openalex.org/W2128361829","https://openalex.org/W2132822754","https://openalex.org/W2150847510","https://openalex.org/W2166602595","https://openalex.org/W2295204998","https://openalex.org/W4285719527","https://openalex.org/W6675844770","https://openalex.org/W6697692894"],"related_works":["https://openalex.org/W2372156812","https://openalex.org/W2374393728","https://openalex.org/W2386545329","https://openalex.org/W2382286253","https://openalex.org/W2356011375","https://openalex.org/W1795360416","https://openalex.org/W2392979115","https://openalex.org/W1969771171","https://openalex.org/W2354198089","https://openalex.org/W819284483"],"abstract_inverted_index":{"In":[0],"existing":[1],"RBAC":[2,115],"literature,":[3],"administrative":[4,46,70,80,95,111],"privileges":[5],"are":[6],"inherited":[7],"just":[8],"like":[9],"ordinary":[10],"user":[11,66],"privileges.":[12,81],"We":[13,38,82],"argue":[14],"that":[15,27,63,87],"from":[16],"a":[17,28,58,65,68],"security":[18,116],"viewpoint":[19],"this":[20,104],"is":[21,74,89,97],"too":[22],"restrictive,":[23],"and":[24,101],"we":[25],"believe":[26],"more":[29],"flexible":[30],"approach":[31],"can":[32,106],"be":[33,107],"very":[34],"useful":[35],"in":[36,57,113],"practice.":[37],"define":[39],"an":[40,114],"ordering":[41],"on":[42],"the":[43,52,84],"set":[44],"of":[45],"privileges,":[47],"enabling":[48],"us":[49],"to":[50,91,109],"extend":[51],"standard":[53],"privilege":[54,96],"inheritance":[55],"relation":[56],"natural":[59],"way.":[60],"This":[61],"means":[62],"if":[64],"has":[67],"particular":[69],"privilege,":[71],"then":[72],"she":[73],"also":[75],"implicitly":[76],"authorized":[77],"for":[78],"weaker":[79,98],"prove":[83],"non-trivial":[85],"result":[86,105],"it":[88],"possible":[90],"decide":[92,110],"whether":[93],"one":[94],"than":[99],"another":[100],"show":[102],"how":[103],"used":[108],"requests":[112],"monitor.":[117]},"counts_by_year":[],"updated_date":"2026-03-16T09:10:04.655348","created_date":"2025-10-10T00:00:00"}
