UC-RBAC: A usage constrained role-based access control model

被引:0
|
作者
Xu, Z [1 ]
Feng, DG [1 ]
Li, L [1 ]
Chen, H [1 ]
机构
[1] ISCAS, State Key Lab Informat Secur, Beijing, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Role-based access control (RBAC) models have received broad support as a generalized approach to access control. However, there are requirements to limit the maximum number of usage times of roles assigned to users, that cannot be modeled under current RBAC models. We present UC-RBAC model, an extended RBAC model, to tackle such dynamic aspects. UC-RBAC supports such constraints during periodic time. The constraints can be set to limit the usage of a role of both a specified user and all users assigned to the role. The formal definition and semantics of the model are presented.
引用
收藏
页码:337 / 347
页数:11
相关论文
共 50 条
  • [1] λ-RBAC: PROGRAMMING WITH ROLE-BASED ACCESS CONTROL
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    LOGICAL METHODS IN COMPUTER SCIENCE, 2008, 4 (01)
  • [2] λ-RBAC:: Programming with role-based access control
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, 2006, 4052 : 456 - 467
  • [3] uT-RBAC: Ubiquitous role-based access control model
    Chae, SH
    Kim, W
    Kim, DK
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01): : 238 - 239
  • [4] Role-based Access Control (RBAC) Authorization in Kubernetes
    Rostami G.
    Journal of ICT Standardization, 2023, 11 (03): : 237 - 260
  • [5] Efficient Access Enforcement in Distributed Role-Based Access Control (RBAC) Deployments
    Tripunitara, Mahesh V.
    Carbunar, Bogdan
    SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 155 - 164
  • [6] Management advantages of object classification in role-based access control (RBAC)
    Jafari, Mohammad
    Fathian, Mohammad
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 95 - 110
  • [7] I-RBAC: Isolation Enabled Role-Based Access Control
    Gunti, Nagajyothi
    Sun, Weiqing
    Niamat, Mohammed
    2011 NINTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2011, : 79 - 86
  • [8] Extending Role-based Access Control for Business Usage
    Klarl, Heiko
    Molitorisz, Korbinian
    Emig, Christian
    Klinger, Karsten
    Abeck, Sebastian
    2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 136 - +
  • [9] Owner-Based Role-Based Access Control OB-RBAC
    Saffarian, Mohsen
    Sadighi, Babak
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 236 - 241
  • [10] Emergency role-based access control (E-RBAC) and analysis of model specifications with alloy
    Nazerian, Fatemeh
    Motameni, Homayun
    Nematzadeh, Hossein
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 45 : 131 - 142