A Novel Role-Based-Access-Control(RBAC) Framework and Application

被引:0
|
作者
Zhou, Yanjie [1 ]
Wen, Min [2 ]
机构
[1] Jiangxi Sci & Technol Normal Univ, Coll Math & Comp Sci, Nanchang 330031, Peoples R China
[2] Nanchang Inst Technol, Dept Civil & Architectural Engn, Nanchang 330099, Peoples R China
关键词
RBAC; Access Control; Internet Security; Novel Framework and Application;
D O I
暂无
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
In recent time, RBAC has gained and kept a dominant stage of AC(access control) in the research area and industry, respectively. Over the time, needs for risk awareness in AC has paid special attention. Even though, role based access control conquers risk via inner features, a quantified method of risk awareness has been proposed as a leading and fascinating research topic due to its inherent flexibility. In this approach, risk-cost metrics are calculated for different entities involved in AC such as users and related objects and a risk threshold restricts the permissions which could be exercised. The quantified methodology arranges dynamism in access decisions procedure based on contexts-situations such as an worker accessing sensitive files through a work computer versus accessing using her own device. In this paper, we compare the difference between the traditional risk mitigation and the recent quantified risk-aware approaches in RBAC and propose a framework for introducing risk-awareness in RBAC models that incorporates quantified-risk. We also provide a formal specification of an adaptive risk-aware RBAC model by enhancing the NIST core RBAC model.
引用
收藏
页码:207 / 210
页数:4
相关论文
共 50 条
  • [32] Efficient and Flexible Role-Based Access Control (EF-RBAC) Mechanism for Cloud
    Harnal, Shilpi
    Chauhan, R. K.
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2020, 7 (26) : 1 - 10
  • [33] Fine-grained Access Control Model Based on RBAC
    Gao, Lei
    Pan, Shulin
    AUTOMATION EQUIPMENT AND SYSTEMS, PTS 1-4, 2012, 468-471 : 1667 - +
  • [34] A Hierarchical Access Control Model of Software Repository Based on RBAC
    Cen Pengrui
    Wu LingDa
    Yang Chao
    Yu Ronghuan
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 761 - 765
  • [35] Modeling of RBAC-based access control of virtual enterprise
    Chen, Dejun
    Zhou, Zude
    Ma, Yingzhe
    Pham, D. T.
    KYBERNETES, 2008, 37 (9-10) : 1242 - 1249
  • [36] Constraint based role based access control in the SECTET-framework
    Alam, Muhammad
    Hafner, Michael
    Breu, Ruth
    JOURNAL OF COMPUTER SECURITY, 2008, 16 (02) : 223 - 260
  • [37] A Novel Generalized Framework for Access Control Based on the Immune Mechanism
    Wang, Lei
    Yin, Caiyan
    Dong, Han
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 1427 - 1431
  • [38] A Framework for Risk-Aware Role Based Access Control
    Bijon, Khalid Zaman
    Krishnan, Ram
    Sandhu, Ravi
    2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 462 - 469
  • [39] Emergency role-based access control (E-RBAC) and analysis of model specifications with alloy
    Nazerian, Fatemeh
    Motameni, Homayun
    Nematzadeh, Hossein
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 45 : 131 - 142
  • [40] A Review on Extended Role Based Access Control (E-RBAC) Model in Pervasive Computing Environment
    Abu Bakar, Asmidar
    Ismail, Roslan
    Jais, Jamilin
    NDT: 2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKED DIGITAL TECHNOLOGIES, 2009, : 533 - +