A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure

被引:0
|
作者
ZHANG Shaomin~ 1
2. School of Computer
机构
基金
中国国家自然科学基金;
关键词
access control; RBAC(role-based access control); trust; cache; PMI(privilege management infrastructure);
D O I
暂无
中图分类号
TP333 [存贮器];
学科分类号
081201 ;
摘要
PMI(privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC(Role-based Access Control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is described in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also.
引用
收藏
页码:1827 / 1830
页数:4
相关论文
共 50 条
  • [1] Role-based privilege and trust management
    Shin, D
    Ahn, GJ
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2005, 20 (06): : 401 - 410
  • [2] Specifying and enforcing the principle of least privilege in role-based access control
    Ma, Xiaopu
    Li, Ruixuan
    Lu, Zhengding
    Lu, Jianfeng
    Dong, Meng
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2011, 23 (12): : 1313 - 1331
  • [3] Rights management for role-based access control
    Bouwman, Bart
    Mauw, Sjouke
    Petkovic, Milan
    2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 1085 - +
  • [4] Quantitative analysis and enforcement of the principle of least privilege in role-based access control
    Lai, Chunren
    Zhang, Chang N.
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 69 - +
  • [5] Trust-based user-role assignment in role-based access control
    Takabi, Hassan
    Amini, Morteza
    Jalili, Rasool
    2007 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2007, : 807 - +
  • [6] Toward role-based provisioning and access control for infrastructure as a service (IaaS)
    Shin, Dongwan
    Akkan, Hakan
    Claycomb, William
    Kim, Kwanjoong
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2011, 2 : 243 - 255
  • [7] Role-based access control
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [8] Role-based trust assignment in trust management systems
    Shin, D
    Ahn, GJ
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2004, : 551 - 558
  • [9] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [10] A Trust Management Framework for Secure Cloud Data Storage Using Cryptographic Role-Based Access Control
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2013, 2014, 456 : 226 - 251