Applications of the oriented permission role-based access control model

被引:1
|
作者
Chen, Liang [1 ]
Crampton, Jason [1 ]
机构
[1] Univ London Royal Holloway & Bedford New Coll, Informat Secur Grp, Egham TW20 0EX, Surrey, England
关键词
D O I
10.1109/PCCC.2007.358918
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Role-based access control and role hierarchies have been the subject of considerable research in recent years. In this paper we consider three useful applications of a new role-based access control model that contains a novel approach to permissions and permission inheritance: one is to illustrate that the new model provides a simpler and more natural way to implement BLP model using role-based techniques; a second application is to make it possible to define separation of duty constraints on two roles that have a common senior role and for a user to be assigned to or activate the senior role; finally, we describe how a single hierarchy in the new model can support the distinction between role activation and permission usage. In short, the oriented permission model provides ways of implementing a number of useful features that have previously required ad hoc and inelegant solutions.
引用
收藏
页码:387 / +
页数:3
相关论文
共 50 条
  • [31] Dynamically Authorized Role-Based Access Control for Grid Applications
    YAO Hanbing HU Heping LU Zhengding LI Ruixuan
    Geo-Spatial Information Science, 2006, (03) : 223 - 228
  • [32] Embedding role-based access control model in object-oriented systems to protect privacy
    Chou, SC
    JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 71 (1-2) : 143 - 161
  • [33] Dynamically authorized role-based access control for grid applications
    College of Computer Science and Technology, Huazhong University of Science and Technology, Guanshan, Wuhan 430074, China
    Geo-Spatial Inf. Sci., 2006, 3 (223-228+233):
  • [34] Dynamically Authorized Role-Based Access Control for Grid Applications
    Yao Hanbing
    Hu Heping
    Lu Zhengding
    Li Ruixuan
    GEO-SPATIAL INFORMATION SCIENCE, 2006, 9 (03) : 223 - +
  • [35] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [36] Role-Based Access Control and the Access Control Matrix
    Saunders, G.
    Hitchens, M.
    Varadharajan, V.
    2001, Association for Computing Machinery (35):
  • [37] Role hierarchy model for role-based access control and its application
    Zhong, Hua
    Feng, Yulin
    Jiang, Hongan
    2000, (11):
  • [38] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    COMPUTER, 2012, 45 (06) : 81 - 88
  • [39] Role-based access control in DCOM
    Ahn, GJ
    JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
  • [40] Role-based access control hierarchy model in distributed system
    Hong, Fan
    Wu, Min
    2003, Huazhong University of Science and Technology (31):