Extending a Role Graph for Role-Based Access Control

被引:0
|
作者
Asakura, Yoshiharu [1 ,2 ]
Nakamoto, Yukikazu [2 ]
机构
[1] NEC Corp Ltd, Syst Platforms Res Labs, Kawasaki, Kanagawa 2118666, Japan
[2] Univ Hyogo, Grad Sch Appl Informat, Kobe, Hyogo 6500044, Japan
来源
关键词
RBAC; role graph; transformation algorithm; equivalence;
D O I
10.1587/transinf.E92.D.211
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Role-based access control (RBAC) is widely used as an access control mechanism in various computer systems. Since an organization's lines of authority influence the authorized privileges of jobs, roles also form a hierarchical structure. A role graph is a model that represents role hierarchies and is suitable for the runtime phase of RBAC deployment. Since a role graph cannot take various forms for given roles and cannot handle abstraction of roles well, however, it is not suitable for the design phase of RBAC deployment. Hence, an extended role graph, which can take a more flexible form than that of a role graph, is proposed. The extended role graph improves diversity and clarifies abstraction of roles, making it suitable for the design phase. An equivalent transformation algorithm (ETA), for transforming an extended role graph into an equivalent role graph, is also proposed. Using the ETA, system administrators can deploy efficiently RBAC by using an extended role graph in the design phase and a standard role graph in the runtime phase.
引用
收藏
页码:211 / 219
页数:9
相关论文
共 50 条
  • [31] Modal logic for role-based access control
    Kosiyatrakul, T
    Older, S
    Chin, SK
    COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 179 - 193
  • [32] Garbled role-based access control in the cloud
    Masoom Alam
    Naina Emmanuel
    Tanveer Khan
    Yang Xiang
    Houcine Hassan
    Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 1153 - 1166
  • [33] Cryptographic Enforcement of Role-Based Access Control
    Crampton, Jason
    FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 191 - 205
  • [34] Hierarchical role-based access control development
    Kolegov, D. N.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2012, 17 (03): : 70 - 76
  • [35] Role-based access control for web services
    College of Information Sciences and Technology, Donghua University, 1882 Yan'an Road , Shanghai 200051, China
    WSEAS Trans. Inf. Sci. Appl., 2006, 8 (1553-1558):
  • [36] λ-RBAC: PROGRAMMING WITH ROLE-BASED ACCESS CONTROL
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    LOGICAL METHODS IN COMPUTER SCIENCE, 2008, 4 (01)
  • [37] Concurrency and Time in Role-Based Access Control
    Chiang, Chia-Chu
    Bayrak, Coskun
    ADVANCES IN INFORMATION SECURITY AND ITS APPLICATION, 2009, 36 : 37 - 42
  • [38] Role-Based Access Control Models for Android
    Talegaon, Samir
    Krishnan, Ram
    2020 SECOND IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2020), 2020, : 179 - 188
  • [39] Role-Based Access Control Modeling and Validation
    Haraty, Ramzi A.
    Naous, Mirna
    2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
  • [40] Static Enforcement of Role-Based Access Control
    Ali, Asad
    Fernandez, Maribel
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2014, (163): : 36 - 50