An RBAC implementation and interoperability standard - The INCITS cyber security 1.1 model

被引:5
|
作者
Coyne, Ed [1 ]
Weil, Tim [2 ]
机构
[1] Sci Applicat Int Corp, Mclean, VA 22102 USA
[2] Booz Allen & Hamilton Inc, Mclean, VA 22102 USA
关键词
(Edited Abstract);
D O I
10.1109/MSP.2008.2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Role-based access control (RBAC) is assigned directly to a user, which can provide simpler security administration and finer-grained access control policy. RBAC has provided a widely used model for security administration in large networks of applications and other IT resources. INCITS 359 contains an RBAC reference model, RIIS (RBAC Implementation and Interoperability Standard), as well as a system and administrative functional specifications, which describes a framework of components, use-case scenarios, management interaction functions, data-exchange models, operational definitions and interoperability. The RBAC data exchange model provides the bridge to exchange role information between security domains. RIIS defines technical interaction functions as specific mechanisms for exchanging operational and management data. The CS1.1 RBAC task group is soliciting industry use cases to cite in the area of system-to-system RBAC information exchange.
引用
收藏
页码:84 / 87
页数:4
相关论文
共 50 条
  • [41] Trust Model to Enhance Security and Interoperability of Cloud Environment
    Li, Wenjuan
    Ping, Lingdi
    CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 69 - 79
  • [42] Proposal of an Interoperability Model for Social Security Information Systems
    Delgado, Francisco
    Oton, Salvador
    Ruggia, Raul
    Hilera, Jose R.
    Gutierrez, Jose M.
    ICEIS: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 2, 2013, : 451 - 458
  • [43] Improving Data Security, Privacy, and Interoperability for the IEEE Biometric Open Protocol Standard
    de Lacerda Filho, Eduardo Magalhaes
    Pereira Rocha Filho, Geraldo P.
    de Sousa Jr, Rafael Timoteo
    Goncalves, Vinicius P.
    IEEE ACCESS, 2022, 10 : 26985 - 27001
  • [44] Implementation of Recent Advancements in Cyber Security Practices and Laws in India
    Kumar, Bura Vijay
    Singh, Manvendra
    Arora, Vaishali
    Malik, Khushboo
    Nomani, M. Z. M.
    Kapila, Dhiraj
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON DATA SCIENCE, MACHINE LEARNING AND APPLICATIONS, VOL 1, ICDSMLA 2023, 2025, 1273 : 1050 - 1058
  • [45] Examining the Cyber Security of a Real World Access Control Implementation
    Teule, Julian Jorgensen
    Hensel, Marius Frilund
    Buttner, Victor
    Sorensen, Jonathan Velgaard
    Melgaard, Magnus
    Olsen, Rasmus Lovenstein
    2020 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA 2020), 2020,
  • [46] Analysis of Possibilities for the Establishment and Implementation of Cyber Security in the Republic of Croatia
    Vuksanovic, Irena Petrijevcanin
    2019 61ST INTERNATIONAL SYMPOSIUM ELMAR, 2019, : 155 - 158
  • [47] Implementation of a novel secured authentication protocol for cyber security applications
    Suresh Kumar, V.
    Ibrahim Khalaf, Osamah
    Raman Chandan, Radha
    Bsoul, Qusay
    Kant Gupta, Shashi
    Zawaideh, Firas
    Mohammed Alsekait, Deema
    Salama AbdElminaam, Diaa
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [48] The good practices for implementation of cyber security education for school children
    Ondruskova, Dana
    Pospisil, Richard
    CONTEMPORARY EDUCATIONAL TECHNOLOGY, 2023, 15 (03)
  • [49] Beyond the Castle Model of cyber-risk and cyber-security
    Leuprecht, Christian
    Skillicorn, David B.
    Tait, Victoria E.
    GOVERNMENT INFORMATION QUARTERLY, 2016, 33 (02) : 250 - 257
  • [50] Applying RBAC Security Control Model to Manufacturing and Logistics Service Platform
    Shin, Moon Sun
    Ju, Yong Wan
    Kang, Hyun Kyu
    Jeong, Seon Phil
    STUDIES IN INFORMATICS AND CONTROL, 2015, 24 (03): : 339 - 350