A Novel Role-Based-Access-Control(RBAC) Framework and Application

被引:0
|
作者
Zhou, Yanjie [1 ]
Wen, Min [2 ]
机构
[1] Jiangxi Sci & Technol Normal Univ, Coll Math & Comp Sci, Nanchang 330031, Peoples R China
[2] Nanchang Inst Technol, Dept Civil & Architectural Engn, Nanchang 330099, Peoples R China
关键词
RBAC; Access Control; Internet Security; Novel Framework and Application;
D O I
暂无
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
In recent time, RBAC has gained and kept a dominant stage of AC(access control) in the research area and industry, respectively. Over the time, needs for risk awareness in AC has paid special attention. Even though, role based access control conquers risk via inner features, a quantified method of risk awareness has been proposed as a leading and fascinating research topic due to its inherent flexibility. In this approach, risk-cost metrics are calculated for different entities involved in AC such as users and related objects and a risk threshold restricts the permissions which could be exercised. The quantified methodology arranges dynamism in access decisions procedure based on contexts-situations such as an worker accessing sensitive files through a work computer versus accessing using her own device. In this paper, we compare the difference between the traditional risk mitigation and the recent quantified risk-aware approaches in RBAC and propose a framework for introducing risk-awareness in RBAC models that incorporates quantified-risk. We also provide a formal specification of an adaptive risk-aware RBAC model by enhancing the NIST core RBAC model.
引用
收藏
页码:207 / 210
页数:4
相关论文
共 50 条
  • [21] Geo-Social-RBAC: A Location-Based Socially Aware Access Control Framework
    Baracaldo, Nathalie
    Palanisamy, Balaji
    Joshi, James
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 501 - 509
  • [22] RBAC-SC: Role-Based Access Control Using Smart Contract
    Cruz, Jason Paul
    Kaji, Yuichi
    Yanai, Naoto
    IEEE ACCESS, 2018, 6 : 12240 - 12251
  • [23] Access control based on RBAC in distributed cooperation environment
    Yin Shao-hong
    Wang Wei
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 119 - +
  • [24] Team and task based RBAC access control model
    Zhou, Wei
    Meinel, Christoph
    2007 LATIN AMERICAN NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2007, : 84 - 94
  • [25] Cloud-Based Access Control Framework for Effective Role Provisioning in Business Application
    Auxilia, M.
    Raja, K.
    Kannan, K.
    INTERNATIONAL JOURNAL OF SYSTEM DYNAMICS APPLICATIONS, 2020, 9 (01) : 63 - 80
  • [26] Role based access control framework for network enterprises
    Thomsen, D
    O'Brien, D
    Bogle, J
    14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, : 50 - 58
  • [27] RBAC standard rationale - Comments on "A Critique of the ANSI Standard on Role-Based Access Control"
    Ferraiolo, David
    Kuhn, Rick
    Sandhu, Ravi
    IEEE SECURITY & PRIVACY, 2007, 5 (06) : 51 - 53
  • [28] Role-Based Access Control (RBAC) in Java via proxy objects using annotations
    Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada
    Proc. ACM Symp. Access Control Models Technol. SACMAT, (79-88):
  • [29] RBAC-GL: A Role-Based Access Control Gasless Architecture of Consortium Blockchain
    Xu, Zhiyu
    Jiao, Tengyun
    Yang, Lin
    Liu, Donghai
    Wen, Sheng
    Xiang, Yang
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING (ICA3PP 2019), PT I, 2020, 11944 : 439 - 453
  • [30] Spatio Temporal Emergency Role Based Access Control (STEM-RBAC) A Time and Location Aware Role Based Access Control Model with a Break the Glass Mechanism
    Georgakakis, Emmanouil
    Nikolidakis, Stefanos A.
    Vergados, Dimitrios D.
    Douligeris, Christos
    2011 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2011,