
A concept of role is widely and significantly used to design and implement secure information systems. A role shows a job function in an enterprise. In a role-based access control (RBAC) model, a role is a set of access rights. A subject doing a job is assigned with a role showing the job. In addition, a subject can play multiple roles in an enterprise. In addition to keeping systems secure, objects have to be consistent in presence of multiple conflicting transactions. Traditional locking protocols and timestamp ordering (TO) schedulers are based on principles "first-comer-winner" and "timestamp order" to make multiple conflicting transactions serializable, respectively. Since a transaction is associated with a collection of roles, we discuss which collection of roles is more significant than others. We discuss a role ordering (RO) scheduler so that multiple conflicting transactions are serializable in the significant dominant relation of roles.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 18 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Top 10% |
