An RBAC implementation and interoperability standard - The INCITS cyber security 1.1 model

被引:5
|
作者
Coyne, Ed [1 ]
Weil, Tim [2 ]
机构
[1] Sci Applicat Int Corp, Mclean, VA 22102 USA
[2] Booz Allen & Hamilton Inc, Mclean, VA 22102 USA
关键词
(Edited Abstract);
D O I
10.1109/MSP.2008.2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Role-based access control (RBAC) is assigned directly to a user, which can provide simpler security administration and finer-grained access control policy. RBAC has provided a widely used model for security administration in large networks of applications and other IT resources. INCITS 359 contains an RBAC reference model, RIIS (RBAC Implementation and Interoperability Standard), as well as a system and administrative functional specifications, which describes a framework of components, use-case scenarios, management interaction functions, data-exchange models, operational definitions and interoperability. The RBAC data exchange model provides the bridge to exchange role information between security domains. RIIS defines technical interaction functions as specific mechanisms for exchanging operational and management data. The CS1.1 RBAC task group is soliciting industry use cases to cite in the area of system-to-system RBAC information exchange.
引用
收藏
页码:84 / 87
页数:4
相关论文
共 50 条
  • [21] Differential gloss quality scale experiment update: an appearance-based image quality standard initiative (INCITS W1.1)
    Ng, Yee S.
    Kuo, Chunghui.
    Maggard, Eric
    Mashtare, Dale
    Morris, Peter
    Farnand, Susan
    IMAGE QUALITY AND SYSTEM PERFORMANCE IV, 2007, 6494
  • [22] Implementation of the Authorization Management with RBAC in the Usage Control Model
    Cai, Hui
    Li, Peiwu
    PROCEEDINGS OF INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2009), 2009, : 179 - 182
  • [23] Cyber-security gamification in federation of cyber ranges: design, implementation, and evaluation
    Diakoumakos, Jason
    Chaskos, Evangelos
    Kolokotronis, Nicholas
    Lepouras, George
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2025, 24 (01)
  • [24] An Approach for Creation and Implementation of National Cyber Security Strategy
    Senol, Mustafa
    2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2017, : 189 - 194
  • [25] Optimization of cyber security through the implementation of AI technologies
    Nawaf, Liqaa
    Bentotahewa, Vibhushinie
    JOURNAL OF INTELLIGENT SYSTEMS, 2025, 34 (01)
  • [26] Considerations for Cyber Security Implementation in Autonomous Vehicle Systems
    Lee, Kyung Su
    2021 21ST INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS (ICCAS 2021), 2021, : 1383 - 1386
  • [27] Implementation of cyber security for safety systems of nuclear facilities
    Park, JaeKwan
    Suh, YongSuk
    Park, Cheol
    PROGRESS IN NUCLEAR ENERGY, 2016, 88 : 88 - 94
  • [28] Security Analysis of RBAC with Temporal Constraints - A Model Checking Approach
    Mondal, Samrat
    Sural, Shamik
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 319 - 328
  • [29] NCSecMM: A National Cyber Security Maturity Model for an Interoperable "National Cyber Security" Framework
    El Kettani, Mohamed Dafir Ech-Cherif
    Debbagh, Taieb
    9TH EUROPEAN CONFERENCE ON E-GOVERNMENT, PROCEEDINGS, 2009, : 236 - +
  • [30] Model-based cyber security
    Rasche, Galen
    Allwein, Erin
    Moore, Michael
    Abbott, Ben
    ECBS 2007: 14TH ANNUAL IEEE INTERNATIONAL CONFERENCE AND WORKSHOPS ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS: RAISING EXPECTATIONS OF COMPUTER-BASES SYSTEMS, 2007, : 405 - 412