Extending a Role Graph for Role-Based Access Control

被引:0
|
作者
Asakura, Yoshiharu [1 ,2 ]
Nakamoto, Yukikazu [2 ]
机构
[1] NEC Corp Ltd, Syst Platforms Res Labs, Kawasaki, Kanagawa 2118666, Japan
[2] Univ Hyogo, Grad Sch Appl Informat, Kobe, Hyogo 6500044, Japan
来源
关键词
RBAC; role graph; transformation algorithm; equivalence;
D O I
10.1587/transinf.E92.D.211
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Role-based access control (RBAC) is widely used as an access control mechanism in various computer systems. Since an organization's lines of authority influence the authorized privileges of jobs, roles also form a hierarchical structure. A role graph is a model that represents role hierarchies and is suitable for the runtime phase of RBAC deployment. Since a role graph cannot take various forms for given roles and cannot handle abstraction of roles well, however, it is not suitable for the design phase of RBAC deployment. Hence, an extended role graph, which can take a more flexible form than that of a role graph, is proposed. The extended role graph improves diversity and clarifies abstraction of roles, making it suitable for the design phase. An equivalent transformation algorithm (ETA), for transforming an extended role graph into an equivalent role graph, is also proposed. Using the ETA, system administrators can deploy efficiently RBAC by using an extended role graph in the design phase and a standard role graph in the runtime phase.
引用
收藏
页码:211 / 219
页数:9
相关论文
共 50 条
  • [41] λ-RBAC:: Programming with role-based access control
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, 2006, 4052 : 456 - 467
  • [42] Adding Attributes to Role-Based Access Control
    Kuhn, D. Richard
    Coyne, Edward J.
    Weil, Timothy R.
    COMPUTER, 2010, 43 (06) : 79 - 81
  • [43] Cryptographic Role-Based Access Control, Reconsidered
    Liu, Bin
    Michalas, Antonis
    Warinschi, Bogdan
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2022, 2022, 13600 : 282 - 289
  • [44] Integrating Attributes into Role-Based Access Control
    Rajpoot, Qasim Mahmood
    Jensen, Christian Damsgaard
    Krishnan, Ram
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXIX, 2015, 9149 : 242 - 249
  • [45] A novel approach to role-based access control
    Chae, SH
    Kim, W
    Kim, DK
    COMPUTATIONAL SCIENCE - ICCS 2003, PT IV, PROCEEDINGS, 2003, 2660 : 1060 - 1068
  • [46] Mining constraints in role-based access control
    Ma, Xiaopu
    Li, Ruixuan
    Lu, Zhengding
    Wang, Wei
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 87 - 96
  • [47] The implementation of role-based access control on the web
    Xu, CG
    Yan, H
    Liu, FG
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : D251 - D255
  • [48] Garbled role-based access control in the cloud
    Alam, Masoom
    Emmanuel, Naina
    Khan, Tanveer
    Xiang, Yang
    Hassan, Houcine
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 1153 - 1166
  • [49] Spatial context in role-based access control
    Zhang, Hong
    He, Yeping
    Shi, Zhiguo
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2006, PROCEEDINGS, 2006, 4296 : 166 - 178
  • [50] A Role-Based Workflow Access Control Model
    Zhang Wen-dong
    Zhang Kai-ji
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 1136 - 1139