A Novel Role-Based-Access-Control(RBAC) Framework and Application

被引:0
|
作者
Zhou, Yanjie [1 ]
Wen, Min [2 ]
机构
[1] Jiangxi Sci & Technol Normal Univ, Coll Math & Comp Sci, Nanchang 330031, Peoples R China
[2] Nanchang Inst Technol, Dept Civil & Architectural Engn, Nanchang 330099, Peoples R China
关键词
RBAC; Access Control; Internet Security; Novel Framework and Application;
D O I
暂无
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
In recent time, RBAC has gained and kept a dominant stage of AC(access control) in the research area and industry, respectively. Over the time, needs for risk awareness in AC has paid special attention. Even though, role based access control conquers risk via inner features, a quantified method of risk awareness has been proposed as a leading and fascinating research topic due to its inherent flexibility. In this approach, risk-cost metrics are calculated for different entities involved in AC such as users and related objects and a risk threshold restricts the permissions which could be exercised. The quantified methodology arranges dynamism in access decisions procedure based on contexts-situations such as an worker accessing sensitive files through a work computer versus accessing using her own device. In this paper, we compare the difference between the traditional risk mitigation and the recent quantified risk-aware approaches in RBAC and propose a framework for introducing risk-awareness in RBAC models that incorporates quantified-risk. We also provide a formal specification of an adaptive risk-aware RBAC model by enhancing the NIST core RBAC model.
引用
收藏
页码:207 / 210
页数:4
相关论文
共 50 条
  • [1] Role-Based-Access-Control: A Novel Approach
    Zhou, Yanjie
    Wen, Min
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND COMPUTING TECHNOLOGY, 2015, 30 : 211 - 214
  • [2] λ-RBAC: PROGRAMMING WITH ROLE-BASED ACCESS CONTROL
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    LOGICAL METHODS IN COMPUTER SCIENCE, 2008, 4 (01)
  • [3] λ-RBAC:: Programming with role-based access control
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, 2006, 4052 : 456 - 467
  • [4] DS RBAC - Dynamic Sessions in Role Based Access Control
    Muehlbacher, Joerg R.
    Praher, Christian
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2009, 15 (03) : 538 - 554
  • [5] Role-based Access Control (RBAC) Authorization in Kubernetes
    Rostami G.
    Journal of ICT Standardization, 2023, 11 (03): : 237 - 260
  • [6] RBAC-Based Access Control Integration Framework for Legacy System
    Guo, He
    Lu, Guoji
    Wang, Yuxin
    Li, Han
    Chen, Xin
    WEB INFORMATION SYSTEMS AND MINING, 2010, 6318 : 194 - +
  • [7] An application of directory service markup language (DSML) for role-based access control (RBAC)
    Shin, DW
    Ahn, GJ
    Park, JS
    26TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 934 - 939
  • [8] Improved Access Control Strategy Based on RBAC Model and Its Application
    Cheng, Yin-lei
    Wang, Fang
    Shang, Lei-ming
    Wang, Biao-ren
    Xu, Juan
    PROCEEDINGS OF THE 2015 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND AUTOMATION ENGINEERING, 2016, 42 : 808 - 813
  • [9] Efficient Access Enforcement in Distributed Role-Based Access Control (RBAC) Deployments
    Tripunitara, Mahesh V.
    Carbunar, Bogdan
    SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 155 - 164
  • [10] RBAC-based access control framework for ensuring privacy in ubiquitous computing
    Hong, Sung-Ho
    Cho, Eun-Ae
    Moon, Chang-Joo
    Baik, Doo-Kwon
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 278 - +