By Topic

A Systematic Mapping on the Role-Permission Relationship in Role Based Access Control Models

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Takeo Ueda, E. ; Lab. de Arquitetura e Redes de Comput., Univ. de Sao Paulo, Sao Paulo, Brazil ; Ruggiero, W.V.

Access control is a key component of security in any computer system. In the last two decades, the research on Role Based Access Control Models was intense. One of the most important components of a Role Based Model is the Role-Permission Relationship. In this paper, the technique of systematic mapping is used to identify, extract and analyze many approaches applied to establish the Role-Permission Relationship. The main goal of this mapping is pointing directions of significant research in the area of Role Based Access Control Models.

Published in:

Latin America Transactions, IEEE (Revista IEEE America Latina)  (Volume:10 ,  Issue: 1 )