CT-RBAC: A temporal RBAC model with conditional periodic time

被引:2
|
作者
Ouyang, Kai [1 ]
Joshi, James B. D. [2 ]
机构
[1] Wuhan Univ Sci & Tech, Sch Comp Sci, Wuhan, Peoples R China
[2] Univ Pittsburgh, Sch Informat Sci, Pittsburgh, PA 15260 USA
基金
美国国家科学基金会;
关键词
role based access control; conditional; temporal; predicate; constraint;
D O I
10.1109/PCCC.2007.358928
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Many emerging applications show need for a fine-grained context based access control requirements. The Generalized Temporal RBAC model has been proposed to capture fine-grained time-based access control requirements using periodic time expression to capture recurring intervals of time. In this paper, we present Conditional Temporal RBAC (CT-ABAC) model that extends CT-RBAC model by extending the periodic time expression. In particular, the extension allows fine-grained extension to capture other logical conditions that restricts the validity of the temporal constraints. CT-RBAC uses a symbolic representation of conditional periodic time that can be used to define set of conditions to qualify the components of a periodic time expression, using the concurrent transaction logic. Because of the conditional set introduced, CT-RBAC extends the time control dimension to the < condition, time > controlplane and the < time, constraint > plane of the GTPBAC framework to the < condition, time, constraint > three-dimensional control space, thus providing more flexibility in the access control model. We analyze conflicts introduced by the constraint set and the complexity of evaluating the conditional set.
引用
收藏
页码:467 / +
页数:2
相关论文
共 50 条
  • [31] A formal proximity model for RBAC systems
    Gupta, Aditi
    Kirkpatrick, Michael S.
    Bertino, Elisa
    COMPUTERS & SECURITY, 2014, 41 : 52 - 67
  • [32] Research and Application of Improved RBAC Model
    Pang Chun-jiang
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL III, 2008, : 257 - 260
  • [33] A Formal Proximity Model for RBAC Systems
    Gupta, Aditi
    Kirkpatrick, Michael
    Bertino, Elisa
    PROCEEDINGS OF THE 2012 8TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM 2012), 2012, : 1 - 10
  • [34] Research and Application Based on RBAC Model
    Guo Xiaolai
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 388 - 391
  • [35] On the Complexity of Authorization of Temporal RBAC in Cloud Computing Service
    Wu, Wenkang
    Tang, Zhuo
    Li, Renfa
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1567 - 1572
  • [36] Toward Implementing Spatio-Temporal RBAC Extensions
    Dubey, Aditya
    Ravi, Uttara
    Sharma, Somya
    Mitra, Barsha
    INFORMATION SYSTEMS SECURITY (ICISS 2019), 2019, 11952 : 59 - 78
  • [37] A WLAN security management framework based on formal spatio-temporal RBAC model
    Bera, P.
    Ghosh, S. K.
    Dasgupta, Pallab
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (09) : 981 - 993
  • [38] Greedy Algorithm for Least Privilege in RBAC Model
    Liu, Jinling
    Huang, Hejiao
    Du, Hongwei
    COMBINATORIAL OPTIMIZATION AND APPLICATIONS, 2011, 6831 : 537 - 545
  • [39] A flexible applicable RBAC model and its administration
    Luo, Zhenxing
    Heilili, Nuermaimaiti
    Lin, Zuoquan
    DEXA 2007: 18TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2007, : 192 - +
  • [40] Home Network-Specific RBAC Model
    Kim, Geon-Woo
    Kim, Do-Woo
    Lee, Jun-Ho
    Hwang, Jin-Beon
    Han, Jong-Wook
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 9, 2005, 9 : 232 - 234