CT-RBAC: A temporal RBAC model with conditional periodic time

被引:2
|
作者
Ouyang, Kai [1 ]
Joshi, James B. D. [2 ]
机构
[1] Wuhan Univ Sci & Tech, Sch Comp Sci, Wuhan, Peoples R China
[2] Univ Pittsburgh, Sch Informat Sci, Pittsburgh, PA 15260 USA
基金
美国国家科学基金会;
关键词
role based access control; conditional; temporal; predicate; constraint;
D O I
10.1109/PCCC.2007.358928
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Many emerging applications show need for a fine-grained context based access control requirements. The Generalized Temporal RBAC model has been proposed to capture fine-grained time-based access control requirements using periodic time expression to capture recurring intervals of time. In this paper, we present Conditional Temporal RBAC (CT-ABAC) model that extends CT-RBAC model by extending the periodic time expression. In particular, the extension allows fine-grained extension to capture other logical conditions that restricts the validity of the temporal constraints. CT-RBAC uses a symbolic representation of conditional periodic time that can be used to define set of conditions to qualify the components of a periodic time expression, using the concurrent transaction logic. Because of the conditional set introduced, CT-RBAC extends the time control dimension to the < condition, time > controlplane and the < time, constraint > plane of the GTPBAC framework to the < condition, time, constraint > three-dimensional control space, thus providing more flexibility in the access control model. We analyze conflicts introduced by the constraint set and the complexity of evaluating the conditional set.
引用
收藏
页码:467 / +
页数:2
相关论文
共 50 条
  • [41] Gran: model checking grsecurity RBAC policies
    Bugliesi, Michele
    Calzavara, Stefano
    Focardi, Riccardo
    Squarcina, Marco
    2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 126 - 138
  • [42] Design and Implementation of the RBAC-SOA Model
    Qu, Zhaoyang
    Meng, Na
    ICSP: 2008 9TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-5, PROCEEDINGS, 2008, : 2945 - +
  • [43] A Model Study on Hierarchical Assisted Exploration of RBAC
    Chen, Wan
    Han, Daojun
    Zhang, Lei
    Xiao, Qi
    Li, Qiuyue
    Xiang, Hongzhen
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2022, 14 (02)
  • [44] Integration of systematic RBAC security model and UML model
    Fan, Baode
    ADVANCED DESIGN AND MANUFACTURING TECHNOLOGY III, PTS 1-4, 2013, 397-400 : 2383 - 2386
  • [45] Study on an Improved Extended-RBAC Model
    Zhang, Xuewang
    Zhang, Yulin
    WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 640 - +
  • [46] Security assurance for an RBAC/MAC security model
    Phillips, CE
    Demurjian, SA
    Ting, TC
    IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 260 - 267
  • [47] The Realization of RBAC Model in Office Automation System
    Jie Anquan
    2008 INTERNATIONAL SEMINAR ON FUTURE INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING, PROCEEDINGS, 2008, : 360 - 363
  • [48] Toward an improved RBAC model for the organic organization
    Shim, WB
    Park, S
    NINTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, PROCEEDINGS, 2002, : 437 - 442
  • [49] The Design and Research of RBAC Model Based on Web
    Du Jiangyi
    Niu Yan
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 640 - 643
  • [50] Safety and liveness for an RBAC/MAC security model
    Phillips, C
    Demurjian, S
    Ting, TC
    DATA AND APPLICATIONS SECURITY XVII: STATUS AND PROSPECTS, 2004, 142 : 316 - 329