Rule Based Authorization Management Using User Context and ROLE

被引:0
|
作者
Ahn, SungWook [1 ]
Rhew, SungYul [1 ]
机构
[1] Soongsil Univ, Dept Comp Sci, Seoul, South Korea
关键词
User Context; Tabular based; Role Based Access Control; Conceptual Authorization Model;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A source code included user context is limit of existing RBAC models under personnel changes or business changes. This research proposed the authorization model and design, which is defined the rule based on tabular using user context which was hard coded in source code in order to resolve the limit of RBAC model. The proposed authorization management was defined as the two stages of authorization model and authorization design. An authorization model was modeled rule using RBAC and user context, authorization design was designed as tabular based using User Context. In order to verify the efficiency of authorization management was compared and analyzed other RBAC models.
引用
收藏
页码:172 / 179
页数:8
相关论文
共 50 条
  • [1] Using ASP for knowledge management with user authorization
    Zhao, Lingzhong
    Qian, Junyan
    Chang, Liang
    Cai, Guoyong
    DATA & KNOWLEDGE ENGINEERING, 2010, 69 (08) : 737 - 762
  • [2] A User-Centric Privacy Authorization Model based on Role and Session in the Context-aware Home
    Choi, Hyangchang
    Yi, Yonghoon
    8TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY WORKSHOPS: CIT WORKSHOPS 2008, PROCEEDINGS, 2008, : 254 - 259
  • [3] Authorization management for role-based collaboration
    Ahn, GJ
    Zhang, LH
    Shin, DW
    Chu, B
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 4128 - 4134
  • [4] Context based enforcement of authorization for privacy and security in identity management
    Alagar, Vasu
    Wan, Kaiyu
    POLICIES AND RESEARCH IN IDENTITY MANAGEMENT, 2008, 261 : 25 - 37
  • [5] Context based enforcement of authorization for privacy and security in identity management
    Alagar, Vasu
    Wan, Kaiyu
    IFIP Advances in Information and Communication Technology, 2008, 261 : 25 - 37
  • [6] Optimal Rule Mining for Dynamic Authorization Management in Collaborating Clouds using Attribute-based Access Control
    John, John C.
    Sural, Shamik
    Gupta, Arobinda
    2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, : 739 - 742
  • [7] Role and task based authorization management for process-view
    Wu, Mei-Yu
    Liu, Duen-Ren
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 85 - 90
  • [8] Authentication and authorization user management within a collaborative community
    Encheva, Sylvia
    Tumin, Sharil
    PROCEEDING OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTERS: COMPUTER SCIENCE AND TECHNOLOGY, VOL 4, 2007, : 563 - +
  • [9] Blockchain-Based Context-Aware Authorization Management as a Service in IoT
    Sylla, Tidiane
    Mendiboure, Leo
    Chalouf, Mohamed Aymen
    Krief, Francine
    SENSORS, 2021, 21 (22)
  • [10] The Modeling and Analysis of Context and Cardinality Constraints Role-Based Authorization Mechanism
    Liu, Limin
    Liu, Yujun
    Cheng, Wei
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2012, 2012, 7405 : 337 - 345