Dynamic Role-Based Access Control for Web services using context and trust

被引:0
|
作者
Tan W. [1 ,2 ]
Xu Y. [1 ]
Zhang T. [1 ]
Wen X. [1 ]
Cui L. [1 ]
Jiang C. [2 ]
机构
[1] School of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing
[2] School of Computer and Information Technology, Shanghai Second Polytechnic University, Shanghai
关键词
Access control; Dynamic authorization assignment; Life cycle context;
D O I
10.4156/jdcta.vol5.issue7.16
中图分类号
学科分类号
摘要
Currently, the security issues of Web services are hot area in information system (IS). This research mainly discusses the key technologies of information access control focusing on following works: After analyzing the dynamic characteristic of application nature for Web services, a Dynamic Role-Based Access Control using Context and Trust model (abbreviated as CT-DRBAC) for Web services is proposed. During Web services, both the subject of invoking request and object of providing service resources are dynamic nature. So, access policies are needed to consider the dynamic nature. The proposed model has been developed and the authorization framework is discussed detail. In order to implement the dynamic trust management mechanism, a dynamic user role authorization algorithm which considers the user lifecycle contexts in the open systems is proposed and designed to meet the dynamic characteristic of subject and object effectively, and achieve intelligent and scientific user role assignments. The proposed access control module can be used in intelligent information systems to grant dynamically roles to users according to the current context.
引用
收藏
页码:121 / 127
页数:6
相关论文
共 50 条
  • [31] A Context-Sensitive Dynamic Role-Based Access Control Model for Pervasive Computing Environments
    Emami, Sareh Sadat
    Zokaei, Saadan
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 2 (01): : 47 - 66
  • [32] A role based access control for Web services
    Wonohoesodo, R
    Tari, Z
    2004 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, 2004, : 49 - 56
  • [33] Role-based access control for grid database services using the community authorization service
    Pereira, AL
    Muppavarapu, V
    Chung, SM
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2006, 3 (02) : 156 - 166
  • [34] Context-Aware Recommendation Using Role-Based Trust Network
    Hong, Liang
    Zou, Lei
    Zeng, Cheng
    Zhang, Luming
    Wang, Jian
    Tian, Jilei
    ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2015, 10 (02)
  • [35] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [36] Design and Implementation of Dynamic Menu Based on Role-Based Access Control
    Chen, Ying
    Yang, Fengyu
    MATERIALS PROCESSING AND MANUFACTURING III, PTS 1-4, 2013, 753-755 : 2990 - 2994
  • [37] Role-based access control using neural network
    Chae, SH
    Kim, W
    Kim, DK
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 36 - 40
  • [38] An application using role-based access control model
    Wang, G
    Cong, B
    Chen, N
    Lan, M
    Yan, HT
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, 2000, : 369 - 375
  • [39] Using NFS to implement role-based access control
    Gustafsson, M
    Deligny, B
    Shahmehri, N
    SIXTH IEEE WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 1997, : 299 - 304
  • [40] Role-Based Access Control and the Access Control Matrix
    Saunders, G.
    Hitchens, M.
    Varadharajan, V.
    2001, Association for Computing Machinery (35):