An Extended RBAC Model Based on Granular Logic

被引:1
|
作者
Han Jian-min [1 ]
Li Xi-yu [1 ]
Yu Hui-qun [2 ]
Tong Jun [1 ]
机构
[1] Zhejiang Normal Univ, Math Phys & Informat Engn Coll, Jinhua 321004, Peoples R China
[2] East China Univ Sci & Technol, Dept Comp Sci & Engn, Shanghai 200237, Peoples R China
关键词
D O I
10.1109/GRC.2008.4664701
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
RBAC(Role-Based Access Control) has been widely investigated and adopted for its simplicity and effectiveness. However there still exist some defects in it, including: (1) traditional RBAC does not consider time and context factors. (2) traditional RBAC only defines a simple logical relationship among roles and permissions, which makes it incompetent to solve authorization problem for large-scale dynamic systems. To remedy these defects, the paper introduces granular computing to RBAC and proposes G-P-BA C modeL G-RBAC granulates permissions and roles, and introduces time and context factors to them. The paper also defines elements' logical relationship in G-RBAC based on granular logic and realizes authorization decision-making by granular logic reasoning. The application examples show that G-RBAC can enhance flexibility of authorization, and realize fine grained access control effectively for large scale enterprise information system.
引用
收藏
页码:261 / +
页数:2
相关论文
共 50 条
  • [1] A dynamic description logic approach to extended RBAC model
    Ma, Li
    Ma, Shilong
    Sui, Yuefei
    PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, MAIN CONFERENCE PAPERS, VOL 1, 2007, : 283 - +
  • [2] An Extended Delegation Model Based On RBAC
    Li, Jinshuang
    Chang, Guiran
    2008 INTERNATIONAL WORKSHOP ON INFORMATION TECHNOLOGY AND SECURITY, 2008, : 228 - 231
  • [3] The extended RBAC model based on grid computing
    CHEN Jian-gang
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2006, (03) : 93 - 97
  • [4] A delegation model for extended RBAC
    Meriam Ben-Ghorbel-Talbi
    Frédéric Cuppens
    Nora Cuppens-Boulahia
    Adel Bouhoula
    International Journal of Information Security, 2010, 9 : 209 - 236
  • [5] A delegation model for extended RBAC
    Ben-Ghorbel-Talbi, Meriam
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    Bouhoula, Adel
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (03) : 209 - 236
  • [6] Study on an Improved Extended-RBAC Model
    Zhang, Xuewang
    Zhang, Yulin
    WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 640 - +
  • [7] An Extended RBAC Model for the Threshold in Collaborative Environment
    Chen Juan-juan
    Cheng Xi-jun
    ICIC 2009: SECOND INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTING SCIENCE, VOL 1, PROCEEDINGS: COMPUTING SCIENCE AND ITS APPLICATION, 2009, : 87 - 90
  • [8] ABDM: An extended flexible delegation model in RBAC
    Li, Min
    Wang, Hua
    2008 IEEE 8TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2008, : 390 - 395
  • [9] Description Logic Based Conflict Detection Methods for RB-RBAC Model
    Yu, Haibo
    Che, Haiyan
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (1A): : 120 - 125
  • [10] Platform for access control management in information system based on extended RBAC model
    Poniszewska-Maranda, Aneta
    12TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2010), 2011, : 510 - 517