UC-RBAC: A usage constrained role-based access control model

被引:0
|
作者
Xu, Z [1 ]
Feng, DG [1 ]
Li, L [1 ]
Chen, H [1 ]
机构
[1] ISCAS, State Key Lab Informat Secur, Beijing, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Role-based access control (RBAC) models have received broad support as a generalized approach to access control. However, there are requirements to limit the maximum number of usage times of roles assigned to users, that cannot be modeled under current RBAC models. We present UC-RBAC model, an extended RBAC model, to tackle such dynamic aspects. UC-RBAC supports such constraints during periodic time. The constraints can be set to limit the usage of a role of both a specified user and all users assigned to the role. The formal definition and semantics of the model are presented.
引用
收藏
页码:337 / 347
页数:11
相关论文
共 50 条
  • [21] A role-based access control model for information mediation
    Yang, L
    Ege, RK
    Ezenwoye, O
    Kharma, Q
    PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 277 - 282
  • [22] Research and implementation of role-based RBAC administration model
    Qiu, J
    Ma, CH
    Yin, JW
    Dong, JX
    Fifth International Conference on Computer and Information Technology - Proceedings, 2005, : 746 - 750
  • [23] Role-based access control model for CSCW systems
    Li, Chengkai
    Zhan, Yongzhao
    Mao, Bing
    Xie, Li
    Ruan Jian Xue Bao/Journal of Software, 2000, 11 (07): : 931 - 937
  • [24] Attributes Enhanced Role-Based Access Control Model
    Rajpoot, Qasim Mahmood
    Jensen, Christian Damsgaard
    Krishnan, Ram
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2015, 9264 : 3 - 17
  • [25] The Research for Spatial Role-Based Access Control Model
    Zou, Zhiwen
    Chen, Changqian
    Ju, Shiguang
    Chen, Jiming
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2010, PT 4, PROCEEDINGS, 2010, 6019 : 296 - 308
  • [26] A formal model for role-based access control with constraints
    Giuri, L
    Iglio, P
    9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 136 - 145
  • [27] A formal model for parameterized role-based access control
    Abdallah, AE
    Khayat, EJ
    FORMAL ASPECTS IN SECURITY AND TRUST, 2005, 173 : 233 - 246
  • [28] A generalized temporal role-based access control model
    Joshi, JBD
    Bertino, E
    Latif, U
    Ghafoor, A
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2005, 17 (01) : 4 - 23
  • [29] A role-based multilevel security access control model
    Pan, L
    Zhang, CN
    Yang, CG
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2006, 46 (03) : 1 - 10
  • [30] An improved Role-based workflow Access Control Model
    Zhao, Hui
    Fang, Zhiyi
    Xu, Peng
    Zhao, Lianyu
    Liu, Jin
    Wang, Tianyang
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 551 - 556