Paper for the Nordic Workshop on Secure IT Systems (NordSec) 2002
Email: firstname.lastname@example.org, WWW: http://www.rsbac.org
November 11, 2002
The model design goals, its specification and implementation outline are presented, followed by a brief comparison to the RBAC and the DTE model. Finally, a Webserver example shows how the model can be used to protect real server systems.
Keywords: Security Model, Access Control,
Internet Server, Linux