Extending a Role Graph for Role-Based Access Control

被引:0
|
作者
Asakura, Yoshiharu [1 ,2 ]
Nakamoto, Yukikazu [2 ]
机构
[1] NEC Corp Ltd, Syst Platforms Res Labs, Kawasaki, Kanagawa 2118666, Japan
[2] Univ Hyogo, Grad Sch Appl Informat, Kobe, Hyogo 6500044, Japan
来源
关键词
RBAC; role graph; transformation algorithm; equivalence;
D O I
10.1587/transinf.E92.D.211
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Role-based access control (RBAC) is widely used as an access control mechanism in various computer systems. Since an organization's lines of authority influence the authorized privileges of jobs, roles also form a hierarchical structure. A role graph is a model that represents role hierarchies and is suitable for the runtime phase of RBAC deployment. Since a role graph cannot take various forms for given roles and cannot handle abstraction of roles well, however, it is not suitable for the design phase of RBAC deployment. Hence, an extended role graph, which can take a more flexible form than that of a role graph, is proposed. The extended role graph improves diversity and clarifies abstraction of roles, making it suitable for the design phase. An equivalent transformation algorithm (ETA), for transforming an extended role graph into an equivalent role graph, is also proposed. Using the ETA, system administrators can deploy efficiently RBAC by using an extended role graph in the design phase and a standard role graph in the runtime phase.
引用
收藏
页码:211 / 219
页数:9
相关论文
共 50 条
  • [1] Role-Based Access Control on Graph Databases
    Chabin, Jacques
    Ciferri, Cristina D. A.
    Halfeld-Ferrari, Mirian
    Hara, Carmem S.
    Penteado, Raqueline R. M.
    SOFSEM 2021: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2021, 12607 : 519 - 534
  • [2] Extending Role-based Access Control for Business Usage
    Klarl, Heiko
    Molitorisz, Korbinian
    Emig, Christian
    Klinger, Karsten
    Abeck, Sebastian
    2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 136 - +
  • [3] Role-based access control
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [4] Extending role-based access control model with context for grid applications
    Cheng, Yanfen
    Yao, Hanbing
    DCABES 2007 PROCEEDINGS, VOLS I AND II, 2007, : 650 - 654
  • [5] Role delegation in role-based access control
    Na, SangYeob
    Cheon, SuhHyun
    Proceedings of the ACM Workshop on Role-Based Access Control, 2000, : 39 - 44
  • [6] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [7] A formal model for Role-Based Access Control using graph transformation
    Koch, M
    Mancini, LV
    Parisi-Presicce, F
    COMPUTER SECURITY - ESORICS 2000, PROCEEDINGS, 2000, 1895 : 122 - 139
  • [8] Role-Based Access Control and the Access Control Matrix
    Saunders, G.
    Hitchens, M.
    Varadharajan, V.
    2001, Association for Computing Machinery (35):
  • [9] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    COMPUTER, 2012, 45 (06) : 81 - 88
  • [10] Role-based access control in DCOM
    Ahn, GJ
    JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184