Role-Based Access Control Implementation Using Prime Numbers

被引:0
|
作者
Sahafizadeh, Ebrahim [1 ]
Sartoly, Sara [2 ]
Chamkoori, Alireza [3 ]
机构
[1] Payame Noor Univ, Dept Informat Technol, Boushehr, Iran
[2] Shahid Chamran Univ Ahwaz, Dept Comp Sci, Ahvaz, Iran
[3] Univ Appl Sci &Technol, Culture & Art Dept, Boushehr, Iran
关键词
access control; RBAC; prime numbers;
D O I
10.1109/ICCEE.2009.154
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Access control is a part of software systems which hasn't presented as an independent part of software development process. It is often used after Software development and applies access policies. In this paper we present an approach to implement Role-Based Access Control (RBAC) using prime numbers in programming languages. Security Policies are able to be applied on applications source code using this approach. A major goal of our implementation is to have elegant solution, minimal changes to the source code and can implement concurrent to software implementation phase.
引用
收藏
页码:234 / +
页数:2
相关论文
共 50 条
  • [31] On the homonymous role in role-based discretionary access control
    Ouyang, Kai
    Chu, Xiaowen
    Jiang, Yixin
    Chen, Hsiao-Hwa
    Liu, Jiangchuan
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 313 - +
  • [32] Extending a Role Graph for Role-Based Access Control
    Asakura, Yoshiharu
    Nakamoto, Yukikazu
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (02): : 211 - 219
  • [33] Role-based access control in TOBIAS and NESS
    Marshall, LF
    IEE PROCEEDINGS-SOFTWARE, 2006, 153 (01): : 4 - 6
  • [34] Role-based access control for boxed ambients
    Compagnoni, Adriana
    Gunter, Elsa L.
    Bidinger, Philippe
    THEORETICAL COMPUTER SCIENCE, 2008, 398 (1-3) : 203 - 216
  • [35] Rights management for role-based access control
    Bouwman, Bart
    Mauw, Sjouke
    Petkovic, Milan
    2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 1085 - +
  • [36] Role-based access control consistency validation
    Centonze, Paolina
    Naumovich, Gleb
    Fink, Stephen J.
    Pistoia, Marco
    Proc. Int. Symp. Softw. Test. Anal. ISSTA, (121-131):
  • [37] Elements of a language for role-based access control
    Hitchens, M
    Varadharajan, V
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 371 - 380
  • [38] Role-based access control for web services
    College of Information Sciences and Technology, Donghua University, 1882 Yan'an Road , Shanghai 200051, China
    WSEAS Trans. Inf. Sci. Appl., 2006, 8 (1553-1558):
  • [39] Resource hierarchies for role-based access control
    Wolf, A
    Von Hammel-Bonten, C
    Köhlmann, M
    Würfel, U
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VI, PROCEEDINGS: INDUSTRIAL SYSTEMS AND ENGINEERING I, 2002, : 195 - 200
  • [40] Cryptographic Enforcement of Role-Based Access Control
    Crampton, Jason
    FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 191 - 205