An RBAC implementation and interoperability standard - The INCITS cyber security 1.1 model

被引:5
|
作者
Coyne, Ed [1 ]
Weil, Tim [2 ]
机构
[1] Sci Applicat Int Corp, Mclean, VA 22102 USA
[2] Booz Allen & Hamilton Inc, Mclean, VA 22102 USA
关键词
(Edited Abstract);
D O I
10.1109/MSP.2008.2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Role-based access control (RBAC) is assigned directly to a user, which can provide simpler security administration and finer-grained access control policy. RBAC has provided a widely used model for security administration in large networks of applications and other IT resources. INCITS 359 contains an RBAC reference model, RIIS (RBAC Implementation and Interoperability Standard), as well as a system and administrative functional specifications, which describes a framework of components, use-case scenarios, management interaction functions, data-exchange models, operational definitions and interoperability. The RBAC data exchange model provides the bridge to exchange role information between security domains. RIIS defines technical interaction functions as specific mechanisms for exchanging operational and management data. The CS1.1 RBAC task group is soliciting industry use cases to cite in the area of system-to-system RBAC information exchange.
引用
收藏
页码:84 / 87
页数:4
相关论文
共 50 条
  • [1] Update on the INCITS W1.1 standard for evaluating the color rendition of printing systems
    Farnand, S
    Töpfer, K
    Kress, W
    Martinez, O
    McCarthy, A
    Shin, H
    Zeise, E
    Gusev, D
    IMAGE QUALITY AND SYSTEM PERFORMANCE II, 2005, 5668 : 157 - 162
  • [2] Update on INCITS W1.1 standard for perceptual evaluation of micro-uniformity
    Zeman, RE
    Kress, W
    Rasmussen, R
    Zeise, E
    Chiu, G
    Donohue, K
    Hertel, D
    IMAGE QUALITY AND SYSTEM PERFORMANCE, 2004, 5294 : 52 - 54
  • [3] Update on the INCITS w1.1 standard for evaluating the color rendition of printing systems
    Cookingham, R
    Dalal, E
    Farnand, S
    Gusev, D
    Kress, W
    Martinez, O
    McCarthy, A
    Töpfer, K
    Zeise, E
    IMAGE QUALITY AND SYSTEM PERFORMANCE, 2004, 5294 : 55 - 59
  • [4] Holistic Performance Model for Cyber Security Implementation Frameworks
    Atoum, Issa
    Otoom, Ahmed
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (03): : 111 - 119
  • [5] Implementation of Permission Management Based on Spring Security and RBAC1 Model
    Xiong, Yuanwei
    Wu, Weiming
    Gu, Yonghao
    2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SCIENCE AND APPLICATION (FCSA 2011), VOL 3, 2011, : 530 - 533
  • [6] Security assurance for an RBAC/MAC security model
    Phillips, CE
    Demurjian, SA
    Ting, TC
    IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 260 - 267
  • [7] Security Communications Interoperability Protocol Implementation
    Ionescu, Valeriu
    Sima, Ion
    Diaconu, Adrian-Viorel
    Stan, Valentin
    2012 9TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2012, : 327 - 330
  • [8] Printing systems perceptual-based gloss and gloss uniformity standard (INCITS W1.1)
    Ng, YS
    Cui, CW
    Kuol, CH
    Maggard, E
    Mashtare, D
    Morris, P
    Viola, M
    IMAGE QUALITY AND SYSTEM PERFORMANCE, 2004, 5294 : 26 - 33
  • [9] Security Sandbox Based on RBAC Model
    Hurtuk, Jan
    Balaz, Anton
    Adam, Norbert
    2016 IEEE 11TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), 2016, : 75 - 79
  • [10] Analyzing RBAC Security Policy of Implementation Using AST
    Tuan-Hung Pham
    Ninh-Thuan Truong
    Viet-Ha Nguyen
    INTERNATIONAL CONFERENCE ON KNOWLEDGE AND SYSTEMS ENGINEERING (KSE 2009), 2009, : 215 - 219