%0 Conference Proceedings %T ROAC: A Role-Oriented Access Control Model %+ Department of Computer Science - K.U.Leuven %A Nassr, Nezar %A Steegmans, Eric %Z Part 6: Policy and Access Control %< avec comité de lecture %( Lecture Notes in Computer Science %B 6th International Workshop on Information Security Theory and Practice (WISTP) %C Egham, United Kingdom %Y Ioannis Askoxylakis %Y Henrich C. Pöhls %Y Joachim Posegga %I Springer %3 Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems %V LNCS-7322 %P 113-127 %8 2012-06-20 %D 2012 %R 10.1007/978-3-642-30955-7_11 %K Access Control %K RBAC %K Authorization %K Role Hierarchies %Z Computer Science [cs]Conference papers %X Role-Based Access Control (RBAC) has become the de facto standard for realizing authorization requirements in a wide range of organizations. Existing RBAC models suffer from two main shortcomings; lack of expressiveness of roles/permissions and ambiguities of their hierarchies. Roles/permissions expressiveness is limited since roles do not have the ability to express behaviour and state, while hierarchical RBAC cannot reflect real organizational hierarchies. In this paper, we propose a novel access control model: The Role-Oriented Access Control Model (ROAC), which is based on the concepts of RBAC but inspired by the object-oriented paradigm. ROAC greatly enhances expressiveness of roles and permissions by introducing parameters and methods as members. The hierarchical ROAC model supports selective inheritance of permissions. %G English %Z TC 11 %Z WG 11.2 %2 https://inria.hal.science/hal-01534310/document %2 https://inria.hal.science/hal-01534310/file/978-3-642-30955-7_11_Chapter.pdf %L hal-01534310 %U https://inria.hal.science/hal-01534310 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-WISTP %~ IFIP-WG11-2 %~ IFIP-LNCS-7322