A History-based Constraint for Separation-of-Duty Policy in Role Based Access Control Model

被引:0
|
作者
Wang, Duoqiang [1 ]
Liu, Wengfang [1 ]
Lu, Jianfeng [1 ]
Ma, Xiaopu [1 ]
机构
[1] Huazhong Univ Sci & Technol, Coll Comp Sci & Technol, Wuhan 430074, Peoples R China
关键词
role based access control; separation-of-duty; history-based constraint; statically mutually exclusive roles;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Separation-of-duty (SoD) is widely considered to be a fundamental principle in computer security. Role-based access control (RBAC) is today's dominant access control model, and supporting SoD policy is widely regarded as one of RBAC's main strengths. In this paper, we show that checking whether a RBAC state satisfies a given static SoD (SSoD) policy is a coNP-complete problem, and using statically mutually exclusive roles (SHIER) to enforce SSoD is usually computationally expensive, while enforcing SSoD policies by a history-based constraint is practicable. Our approach is focused on high-level SSoD policy, and the key idea is to record each permission access request, this history is maintained and processed by two different mechanisms based on two cases, one case is n=2 or m=n, the other case is 2<n<m, The history-based constraint consists of the two cases addresses the goal of the high-level SSoD policy in RBAC model.
引用
收藏
页码:195 / 199
页数:5
相关论文
共 50 条
  • [41] A role based access control model for agent based control systems
    Drouineaud, M
    Lüder, A
    Sohr, K
    INDIN 2003: IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, PROCEEDINGS, 2003, : 307 - 311
  • [42] Security Policy Integration based on Role-Based Access Control Model in Healthcare Collaborative Environments
    Kuang, Teo Poh
    Ibrahim, Hamidah
    PROCEEDINGS OF KNOWLEDGE MANAGEMENT 5TH INTERNATIONAL CONFERENCE 2010, 2010, : 553 - 559
  • [43] Research on Policy-based Access Control Model
    Lin Zhi
    Wang Jing
    Chen Xiao-su
    Jia Lian-xing
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 164 - +
  • [44] A Policy Based Access Control Model of PDM System
    Ye, C. X.
    Fu, Y. Q.
    ADVANCES IN MATERIALS MANUFACTURING SCIENCE AND TECHNOLOGY XIII, VOL 1: ADVANCED MANUFACTURING TECHNOLOGY AND EQUIPMENT, AND MANUFACTURING SYSTEMS AND AUTOMATION, 2009, 626-627 : 735 - +
  • [45] Resource and Role Based Access Control Model
    Li, Xingdong
    Jin, Zhengping
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INDUSTRIAL INFORMATICS, 2015, 31 : 548 - 554
  • [46] Attributed Role Based Access Control Model
    Aftab, Muhammad Umar
    Habib, Muhammad Asif
    Mehmood, Nasir
    Aslam, Mubeen
    Irfan, Muhammad
    2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 83 - 89
  • [47] Semantic Role Based Access Control Model
    Semenova, N. A.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2012, 16 (02): : 50 - 64
  • [48] MUTUAL EXCLUSION ROLE CONSTRAINT MINING BASED ON WEIGHT IN ROLE-BASED ACCESS CONTROL SYSTEM
    Ma, Xiaopu
    Wang, Jianfang
    Zhao, Li
    Li, Ruixuan
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2016, 12 (01): : 91 - 101
  • [49] THE EVALUATION AND COMPARATIVE ANALYSIS OF ROLE BASED ACCESS CONTROL AND ATTRIBUTE BASED ACCESS CONTROL MODEL
    Aftab, Muhammad Umar
    Qin, Zhiguang
    Zakria
    Ali, Safeer
    Pirah
    Khan, Jalaluddin
    2018 15TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2018, : 35 - 39
  • [50] Light-Weight History-Based Medium Access Control (MAC) Protocol for Body Area Networks
    Mouzehkesh, Nesa
    Shafigh, Saman
    Zia, Tanveer
    Zheng, Lihong
    2013 SEVENTH INTERNATIONAL CONFERENCE ON SENSING TECHNOLOGY (ICST), 2013, : 91 - 96