Applications of the oriented permission role-based access control model

被引:1
|
作者
Chen, Liang [1 ]
Crampton, Jason [1 ]
机构
[1] Univ London Royal Holloway & Bedford New Coll, Informat Secur Grp, Egham TW20 0EX, Surrey, England
关键词
D O I
10.1109/PCCC.2007.358918
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Role-based access control and role hierarchies have been the subject of considerable research in recent years. In this paper we consider three useful applications of a new role-based access control model that contains a novel approach to permissions and permission inheritance: one is to illustrate that the new model provides a simpler and more natural way to implement BLP model using role-based techniques; a second application is to make it possible to define separation of duty constraints on two roles that have a common senior role and for a user to be assigned to or activate the senior role; finally, we describe how a single hierarchy in the new model can support the distinction between role activation and permission usage. In short, the oriented permission model provides ways of implementing a number of useful features that have previously required ad hoc and inelegant solutions.
引用
收藏
页码:387 / +
页数:3
相关论文
共 50 条
  • [41] Practical Role-Based Access Control
    Galante, Victoria
    INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73
  • [42] Delegation in role-based access control
    Jason Crampton
    Hemanth Khambhammettu
    International Journal of Information Security, 2008, 7 : 123 - 136
  • [43] Spatial role-based access control model for wireless networks
    Hansen, F
    Oleshchuk, V
    2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 2093 - 2097
  • [44] Role delegation in role-based access control
    Na, SangYeob
    Cheon, SuhHyun
    Proceedings of the ACM Workshop on Role-Based Access Control, 2000, : 39 - 44
  • [45] Role-based access control in JavaTM
    Fondazione Ugo Bordoni, Roma, Italy
    Proceedings of the ACM Workshop on Role-Based Access Control, 1998, : 91 - 100
  • [46] Generalized Role-Based Access Control
    Moyer, MJ
    Ahamad, M
    21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2001, : 391 - 398
  • [47] Fuzzy Role-Based Access Control
    Martinez-Garcia, Carles
    Navarro-Arribas, Guillermo
    Borrell, Joan
    INFORMATION PROCESSING LETTERS, 2011, 111 (10) : 483 - 487
  • [48] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (02) : 123 - 136
  • [49] Migrating to role-based access control
    Brooks, K
    FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 71 - 81
  • [50] Study of Role-based Access Control
    Cao Yonghui
    EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5209 - 5212