Rule Based Authorization Management Using User Context and ROLE

被引:0
|
作者
Ahn, SungWook [1 ]
Rhew, SungYul [1 ]
机构
[1] Soongsil Univ, Dept Comp Sci, Seoul, South Korea
关键词
User Context; Tabular based; Role Based Access Control; Conceptual Authorization Model;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A source code included user context is limit of existing RBAC models under personnel changes or business changes. This research proposed the authorization model and design, which is defined the rule based on tabular using user context which was hard coded in source code in order to resolve the limit of RBAC model. The proposed authorization management was defined as the two stages of authorization model and authorization design. An authorization model was modeled rule using RBAC and user context, authorization design was designed as tabular based using User Context. In order to verify the efficiency of authorization management was compared and analyzed other RBAC models.
引用
收藏
页码:172 / 179
页数:8
相关论文
共 50 条
  • [31] A Usage Control Platform based on Rule Templates and Authorization Credentials
    Stihler, Maicon
    Santin, Altair O.
    Marcon, Arlindo L., Jr.
    2015 XXXIII BRAZILIAN SYMPOSIUM ON COMPUTER NETWORKS AND DISTRIBUTED SYSTEMS, 2015, : 50 - 59
  • [32] User-Friendly Authentication and Authorization Using a Smartphone Proxy
    Roalter, Luis
    Diewald, Stefan
    Moeller, Andreas
    Stockinger, Tobias
    Kranz, Matthias
    COMPUTER AIDED SYSTEMS THEORY, PT II, 2013, 8112 : 390 - 399
  • [33] THE ROLE OF CONTEXT AND ADAPTATION IN USER INTERFACES
    CROFT, WB
    INTERNATIONAL JOURNAL OF MAN-MACHINE STUDIES, 1984, 21 (04): : 283 - 292
  • [34] Design considerations for user authorization in the presence services based on SIP
    Huh, M
    Hyun, W
    Han, J
    Lee, W
    Kang, S
    7th International Conference on Advanced Communication Technology, Vols 1 and 2, Proceedings, 2005, : 1055 - 1058
  • [35] Event detection using the user context in sensor based IoT
    Shivhare, Anubhav
    Singh, Vishal Krishna
    Kumar, Manish
    WIRELESS NETWORKS, 2023, 29 (06) : 2577 - 2589
  • [36] Using a concept-based user context for search personalization
    Daoud, Mariam
    Tamine-Lechani, Lynda
    Boughanem, Mohand
    WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II, 2008, : 293 - 298
  • [37] The RBAC-based user authorization in Sanxin ERP system
    Liu, LL
    Shu, J
    Zheng, JX
    PROCEEDINGS OF THE 11TH JOINT INTERNATIONAL COMPUTER CONFERENCE, 2005, : 155 - 158
  • [38] Mobile User Classification and Authorization Based on Gesture Usage Recognition
    Nixon, Kent W.
    Chen, Xiang
    Mao, Zhi-Hong
    Chen, Yiran
    Li, Kang
    2013 18TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC), 2013, : 384 - 389
  • [39] User authorization based on hand geometry without special equipment
    Klonowski, Marek
    Plata, Marcin
    Syga, Piotr
    PATTERN RECOGNITION, 2018, 73 : 189 - 201
  • [40] Event detection using the user context in sensor based IoT
    Anubhav Shivhare
    Vishal Krishna Singh
    Manish Kumar
    Wireless Networks, 2023, 29 : 2577 - 2589