CT-RBAC: A temporal RBAC model with conditional periodic time

被引:2
|
作者
Ouyang, Kai [1 ]
Joshi, James B. D. [2 ]
机构
[1] Wuhan Univ Sci & Tech, Sch Comp Sci, Wuhan, Peoples R China
[2] Univ Pittsburgh, Sch Informat Sci, Pittsburgh, PA 15260 USA
基金
美国国家科学基金会;
关键词
role based access control; conditional; temporal; predicate; constraint;
D O I
10.1109/PCCC.2007.358928
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Many emerging applications show need for a fine-grained context based access control requirements. The Generalized Temporal RBAC model has been proposed to capture fine-grained time-based access control requirements using periodic time expression to capture recurring intervals of time. In this paper, we present Conditional Temporal RBAC (CT-ABAC) model that extends CT-RBAC model by extending the periodic time expression. In particular, the extension allows fine-grained extension to capture other logical conditions that restricts the validity of the temporal constraints. CT-RBAC uses a symbolic representation of conditional periodic time that can be used to define set of conditions to qualify the components of a periodic time expression, using the concurrent transaction logic. Because of the conditional set introduced, CT-RBAC extends the time control dimension to the < condition, time > controlplane and the < time, constraint > plane of the GTPBAC framework to the < condition, time, constraint > three-dimensional control space, thus providing more flexibility in the access control model. We analyze conflicts introduced by the constraint set and the complexity of evaluating the conditional set.
引用
收藏
页码:467 / +
页数:2
相关论文
共 50 条
  • [1] Migrating from RBAC to temporal RBAC
    Mitra, Barsha
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    IET INFORMATION SECURITY, 2017, 11 (05) : 294 - 300
  • [2] LOT-RBAC:: A location and time-based RBAC model
    Chandran, SM
    Joshi, JBD
    WEB INFORMATION SYSTEMS ENGINEERING - WISE 2005, 2005, 3806 : 361 - 375
  • [3] Ts-RBAC: A RBAC model with transformation
    Liu, Gang
    Zhang, Runnan
    Song, Huimin
    Wang, Can
    Liu, Jinhui
    Liu, Aijun
    COMPUTERS & SECURITY, 2016, 60 : 52 - 61
  • [4] CT-RBAC:一种云计算环境下的访问控制模型
    常玲霞
    王凤英
    赵连军
    贾永新
    程震
    微电子学与计算机, 2014, 31 (06) : 152 - 157
  • [5] A RBAC-Based Multitask Spatio-Temporal Access Control Model MT_RBAC
    Ying, Zhang
    Zhen, Xu
    Chi, Chen
    PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON COMPUTING AND PATTERN RECOGNITION (ICCPR 2018), 2018, : 14 - 20
  • [6] Security analysis of temporal RBAC under an administrative model
    Jha, Sadhana
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    COMPUTERS & SECURITY, 2014, 46 : 154 - 172
  • [7] AT-RBAC:: An authentication trustworthiness-based RBAC model
    Wang, LW
    Wei, LF
    Liao, XK
    Wang, HM
    GRID AND COOPERATIVE COMPUTING GCC 2004 WORKSHOPS, PROCEEDINGS, 2004, 3252 : 343 - 350
  • [8] How to securely break into RBAC: the BTG-RBAC model
    Ferreira, Ana
    Chadwick, David
    Farinha, Pedro
    Correia, Ricardo
    Zao, Gansen
    Chilro, Rui
    Antunes, Luis
    25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 23 - +
  • [9] RBAC model for SCADA
    Majdalawieh, Munir
    Parisi-Presicce, Francesco
    Sandhu, Ravi
    INNOVATIVE ALGORITHMS AND TECHNIQUES IN AUTOMATION, INDUSTRIAL ELECTRONICS AND TELECOMMUNICATIONS, 2007, : 329 - +
  • [10] Security Analysis of RBAC with Temporal Constraints - A Model Checking Approach
    Mondal, Samrat
    Sural, Shamik
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 319 - 328