A Novel Role-Based-Access-Control(RBAC) Framework and Application

被引:0
|
作者
Zhou, Yanjie [1 ]
Wen, Min [2 ]
机构
[1] Jiangxi Sci & Technol Normal Univ, Coll Math & Comp Sci, Nanchang 330031, Peoples R China
[2] Nanchang Inst Technol, Dept Civil & Architectural Engn, Nanchang 330099, Peoples R China
关键词
RBAC; Access Control; Internet Security; Novel Framework and Application;
D O I
暂无
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
In recent time, RBAC has gained and kept a dominant stage of AC(access control) in the research area and industry, respectively. Over the time, needs for risk awareness in AC has paid special attention. Even though, role based access control conquers risk via inner features, a quantified method of risk awareness has been proposed as a leading and fascinating research topic due to its inherent flexibility. In this approach, risk-cost metrics are calculated for different entities involved in AC such as users and related objects and a risk threshold restricts the permissions which could be exercised. The quantified methodology arranges dynamism in access decisions procedure based on contexts-situations such as an worker accessing sensitive files through a work computer versus accessing using her own device. In this paper, we compare the difference between the traditional risk mitigation and the recent quantified risk-aware approaches in RBAC and propose a framework for introducing risk-awareness in RBAC models that incorporates quantified-risk. We also provide a formal specification of an adaptive risk-aware RBAC model by enhancing the NIST core RBAC model.
引用
收藏
页码:207 / 210
页数:4
相关论文
共 50 条
  • [41] A novel approach for role-based access control
    Yang Geng
    Rong Chunming
    Shen Jiangang
    Wang Jiangtao
    CHINESE JOURNAL OF ELECTRONICS, 2007, 16 (01): : 1 - 6
  • [42] HT-RBAC: A Design of Role-based Access Control Model for Microservice Security Manager
    Pasomsup, Chittipat
    Limpiyakorn, Yachai
    2021 INTERNATIONAL CONFERENCE ON BIG DATA ENGINEERING AND EDUCATION (BDEE 2021), 2021, : 177 - 181
  • [43] A novel approach to role-based access control
    Chae, SH
    Kim, W
    Kim, DK
    COMPUTATIONAL SCIENCE - ICCS 2003, PT IV, PROCEEDINGS, 2003, 2660 : 1060 - 1068
  • [44] A RBAC-Based Multitask Spatio-Temporal Access Control Model MT_RBAC
    Ying, Zhang
    Zhen, Xu
    Chi, Chen
    PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON COMPUTING AND PATTERN RECOGNITION (ICCPR 2018), 2018, : 14 - 20
  • [45] Role-Based Access Control (RBAC) in Java']Java via Proxy Objects using Annotations
    Zarnett, Jeff
    Tripunitara, Mahesh
    Lam, Patrick
    SACMAT 2010: PROCEEDINGS OF THE 15TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2010, : 79 - 88
  • [46] An XML-based language for access control specifications in an RBAC environment
    Stoupa, KE
    Vakali, AI
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 1717 - 1722
  • [47] RB-GACA: A RBAC based grid access control architecture
    Jin, Hai
    Qiang, Weizhong
    Shi, Xuanhua
    Zou, Deqing
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2005, 1 (01) : 61 - 70
  • [48] RB-GACA: A RBAC based grid access control architecture
    Qiang, WZ
    Jin, H
    Shi, XH
    Zou, DQ
    Zhang, H
    GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 487 - 494
  • [49] An access control of enterprise financial privacy information based on RBAC model
    Shi, Xuejiao
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2024, 74 (04) : 372 - 381
  • [50] Distributed access control method based on RBAC in OSGi service platform
    Cho, Eun-Ae
    Moon, Chang-Joo
    Baik, Doo-Kwon
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2007, 14 : 1427 - 1431