{"id":"https://openalex.org/W2057486584","doi":"https://doi.org/10.1145/266741.266754","title":"RBAC emulation on trusted DG/UX","display_name":"RBAC emulation on trusted DG/UX","publication_year":1997,"publication_date":"1997-01-01","ids":{"openalex":"https://openalex.org/W2057486584","doi":"https://doi.org/10.1145/266741.266754","mag":"2057486584"},"language":"en","primary_location":{"id":"doi:10.1145/266741.266754","is_oa":true,"landing_page_url":"https://doi.org/10.1145/266741.266754","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/266741.266754","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the second ACM workshop on Role-based access control  - RBAC '97","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/266741.266754","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113594995","display_name":"William J. Meyers","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"William J. Meyers","raw_affiliation_strings":["Data General Corporation, 62 T. W. Alexander Drive, Research Triangle Park, NC"],"affiliations":[{"raw_affiliation_string":"Data General Corporation, 62 T. W. Alexander Drive, Research Triangle Park, NC","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5113594995"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":5.1261,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.95271958,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"55","last_page":"60"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/emulation","display_name":"Emulation","score":0.7383294701576233},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.645919680595398},{"id":"https://openalex.org/keywords/citation","display_name":"Citation","score":0.6047846674919128},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5782514214515686},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.5703684687614441},{"id":"https://openalex.org/keywords/corporation","display_name":"Corporation","score":0.5154877305030823},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4923356771469116},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.41648396849632263},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.3967910706996918},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3444199860095978},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.063444584608078}],"concepts":[{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.7383294701576233},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.645919680595398},{"id":"https://openalex.org/C2778805511","wikidata":"https://www.wikidata.org/wiki/Q1713","display_name":"Citation","level":2,"score":0.6047846674919128},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5782514214515686},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.5703684687614441},{"id":"https://openalex.org/C2778348171","wikidata":"https://www.wikidata.org/wiki/Q167037","display_name":"Corporation","level":2,"score":0.5154877305030823},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4923356771469116},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.41648396849632263},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.3967910706996918},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3444199860095978},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.063444584608078},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/266741.266754","is_oa":true,"landing_page_url":"https://doi.org/10.1145/266741.266754","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/266741.266754","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the second ACM workshop on Role-based access control  - RBAC '97","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/266741.266754","is_oa":true,"landing_page_url":"https://doi.org/10.1145/266741.266754","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/266741.266754","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the second ACM workshop on Role-based access control  - RBAC '97","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2057486584.pdf","grobid_xml":"https://content.openalex.org/works/W2057486584.grobid-xml"},"referenced_works_count":3,"referenced_works":["https://openalex.org/W2000674581","https://openalex.org/W2139289738","https://openalex.org/W2166602595"],"related_works":["https://openalex.org/W318167434","https://openalex.org/W2385885240","https://openalex.org/W293625591","https://openalex.org/W2379813727","https://openalex.org/W2375468217","https://openalex.org/W1992504775","https://openalex.org/W2391072174","https://openalex.org/W2486502170","https://openalex.org/W1512458425","https://openalex.org/W82872213"],"abstract_inverted_index":{"One":[0],"goal":[1],"of":[2,48,76,104],"Role-Based":[3],"Access":[4],"Control":[5],"(RBAC)":[6],"research":[7],"is":[8],"to":[9,18,90,98,115],"identify":[10],"generally":[11],"applicable":[12],"mechanisms":[13,30],"that":[14,31],"are":[15,32],"sufficiently":[16],"flexible":[17],"support":[19],"RBAC":[20,49,63],"behavior":[21],"in":[22,34],"diverse":[23],"applications.":[24],"This":[25],"paper":[26],"discusses":[27],"three":[28],"candidate":[29],"available":[33],"DG/UX@":[35],"B2":[36],"Security":[37],"Option,":[38],"a":[39,46],"high":[40,101],"security":[41,102],"commercial":[42],"off-the-shelfoperating":[43],"system.":[44],"Quite":[45],"bit":[47],"semantics":[50],"can":[51,70,86],"be":[52,71,88],"achieved":[53],"by":[54],"simply":[55],"setting":[56],"the":[57,91,100,105],"system's":[58],"site-configurable":[59],"policy":[60],"parameters.":[61],"Additional":[62],"features,":[64],"such":[65],"as":[66],"dynamic":[67],"role":[68],"management,":[69],"realized":[72],"with":[73],"modest":[74],"amounts":[75],"site-written":[77],"software.":[78],"To":[79],"improve":[80],"manageability,":[81],"an":[82],"RRAC":[83],"presentation":[84],"layer":[85],"also":[87],"added":[89],"site-extensible":[92],"administration":[93],"interface.":[94],"The":[95],"effort":[96],"required":[97],"retain":[99],"assurances":[103],"underlying":[106],"operating":[107],"system,":[108],"using":[109],"these":[110],"mechanisms,":[111],"ranges":[112],"from":[113],"none":[114],"reasonable.":[116]},"counts_by_year":[{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
