UC-RBAC: A usage constrained role-based access control model

被引:0
|
作者
Xu, Z [1 ]
Feng, DG [1 ]
Li, L [1 ]
Chen, H [1 ]
机构
[1] ISCAS, State Key Lab Informat Secur, Beijing, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Role-based access control (RBAC) models have received broad support as a generalized approach to access control. However, there are requirements to limit the maximum number of usage times of roles assigned to users, that cannot be modeled under current RBAC models. We present UC-RBAC model, an extended RBAC model, to tackle such dynamic aspects. UC-RBAC supports such constraints during periodic time. The constraints can be set to limit the usage of a role of both a specified user and all users assigned to the role. The formal definition and semantics of the model are presented.
引用
收藏
页码:337 / 347
页数:11
相关论文
共 50 条
  • [41] Practical Role-Based Access Control
    Galante, Victoria
    INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73
  • [42] Delegation in role-based access control
    Jason Crampton
    Hemanth Khambhammettu
    International Journal of Information Security, 2008, 7 : 123 - 136
  • [43] RBAC-HDE: On the Design of a Role-based Access Control with Smart Contract for Healthcare Data Exchange
    Akkaoui, Raifa
    Hei, Xiaojun
    Guo, Charles
    Cheng, Wenqing
    2019 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2019,
  • [44] Spatial role-based access control model for wireless networks
    Hansen, F
    Oleshchuk, V
    2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 2093 - 2097
  • [45] Role delegation in role-based access control
    Na, SangYeob
    Cheon, SuhHyun
    Proceedings of the ACM Workshop on Role-Based Access Control, 2000, : 39 - 44
  • [46] Role-based access control in JavaTM
    Fondazione Ugo Bordoni, Roma, Italy
    Proceedings of the ACM Workshop on Role-Based Access Control, 1998, : 91 - 100
  • [47] Generalized Role-Based Access Control
    Moyer, MJ
    Ahamad, M
    21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2001, : 391 - 398
  • [48] Fuzzy Role-Based Access Control
    Martinez-Garcia, Carles
    Navarro-Arribas, Guillermo
    Borrell, Joan
    INFORMATION PROCESSING LETTERS, 2011, 111 (10) : 483 - 487
  • [49] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (02) : 123 - 136
  • [50] Migrating to role-based access control
    Brooks, K
    FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 71 - 81