Rule Based Authorization Management Using User Context and ROLE

被引:0
|
作者
Ahn, SungWook [1 ]
Rhew, SungYul [1 ]
机构
[1] Soongsil Univ, Dept Comp Sci, Seoul, South Korea
关键词
User Context; Tabular based; Role Based Access Control; Conceptual Authorization Model;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A source code included user context is limit of existing RBAC models under personnel changes or business changes. This research proposed the authorization model and design, which is defined the rule based on tabular using user context which was hard coded in source code in order to resolve the limit of RBAC model. The proposed authorization management was defined as the two stages of authorization model and authorization design. An authorization model was modeled rule using RBAC and user context, authorization design was designed as tabular based using User Context. In order to verify the efficiency of authorization management was compared and analyzed other RBAC models.
引用
收藏
页码:172 / 179
页数:8
相关论文
共 50 条
  • [11] Context-based and Rule-based Adaptation of Mobile User Interfaces in mHealth
    Alnanih, Reem
    Ormandjieva, Olga
    Radhakrishnan, T.
    4TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2013) AND THE 3RD INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH), 2013, 21 : 390 - 397
  • [12] Using Virtualization Technology for the User Authorization System
    Polenov, Maxim
    Guzik, Vyacheslav
    Lukyanov, Vladislav
    SOFTWARE ENGINEERING TRENDS AND TECHNIQUES IN INTELLIGENT SYSTEMS, CSOC2017, VOL 3, 2017, 575 : 192 - 200
  • [13] A role-based semantic authorization framework for workflow management systems
    Liu, JX
    Chen, HY
    Tang, MD
    CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (01): : 55 - 59
  • [14] Authrule: A generic rule-based authorization module
    Busch, Sonke
    Muschall, Bjorn
    Pernu, Gunther
    Priebe, Torsten
    DATA AND APPLICATIONS SECURITY XX, PROCEEDINGS, 2006, 4127 : 267 - 281
  • [15] A CONTEXT FOR USER INTERFACE MANAGEMENT
    OLSEN, DR
    BUXTON, W
    EHRICH, R
    KASIK, DJ
    RHYNE, JR
    SIBERT, J
    IEEE COMPUTER GRAPHICS AND APPLICATIONS, 1984, 4 (12) : 33 - 42
  • [17] Enhanced Framework for Verifying User Authorization and Data Correctness Using Token Management System in the Cloud
    Balamurugan, B.
    Krishna, P. Venkata
    Devi, Nirmala M.
    Meenakshi, R.
    Abinaya, V
    2014 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2014), 2014, : 1443 - 1447
  • [18] A blockchain-based user authorization management method for information exchanging of federation of industry and commerce
    Yang J.
    Li H.
    IET Blockchain, 2024, 4 (S1): : 632 - 643
  • [19] Conceptual Design Knowledge Management Based on Rule and User's Feedback
    Bao ZhenQiang
    Lei, Guo
    Hui, Zhong
    Rong, Luo
    SECOND INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING: WGEC 2008, PROCEEDINGS, 2008, : 513 - 516
  • [20] A privacy enabled service authorization based on a user-centric virtual identity management system
    Chen, Zhikui
    2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 583 - 587