A Novel Role-Based-Access-Control(RBAC) Framework and Application

被引:0
作者
Zhou, Yanjie [1 ]
Wen, Min [2 ]
机构
[1] Jiangxi Sci & Technol Normal Univ, Coll Math & Comp Sci, Nanchang 330031, Peoples R China
[2] Nanchang Inst Technol, Dept Civil & Architectural Engn, Nanchang 330099, Peoples R China
来源
PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND COMPUTING TECHNOLOGY | 2015年 / 30卷
关键词
RBAC; Access Control; Internet Security; Novel Framework and Application;
D O I
暂无
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
In recent time, RBAC has gained and kept a dominant stage of AC(access control) in the research area and industry, respectively. Over the time, needs for risk awareness in AC has paid special attention. Even though, role based access control conquers risk via inner features, a quantified method of risk awareness has been proposed as a leading and fascinating research topic due to its inherent flexibility. In this approach, risk-cost metrics are calculated for different entities involved in AC such as users and related objects and a risk threshold restricts the permissions which could be exercised. The quantified methodology arranges dynamism in access decisions procedure based on contexts-situations such as an worker accessing sensitive files through a work computer versus accessing using her own device. In this paper, we compare the difference between the traditional risk mitigation and the recent quantified risk-aware approaches in RBAC and propose a framework for introducing risk-awareness in RBAC models that incorporates quantified-risk. We also provide a formal specification of an adaptive risk-aware RBAC model by enhancing the NIST core RBAC model.
引用
收藏
页码:207 / 210
页数:4
相关论文
共 7 条
  • [1] Ahn G.-J., 2000, ACM Transactions on Information and Systems Security, V3, P207, DOI 10.1145/382912.382913
  • [2] A Lattice Interpretation of Group-Centric Collaboration with Expedient Insiders
    Bijon, Khalid Zaman
    Ahmed, Tahmina
    Sandhu, Ravi
    Krishnan, Ram
    [J]. PROCEEDINGS OF THE 2012 8TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM 2012), 2012, : 200 - 209
  • [3] Bijon KhalidZaman., 2012, Information Systems Security, P59, DOI 10.1007/978-3-642-35130-3_5
  • [4] Dechmi F., 2004, J IRRIG DRAIN E ASCE
  • [5] Sandhu Ravi S., 1993, IEEE COMPUTER, V26
  • [6] Separation of duty in role-based environments
    Simon, RT
    Zurko, ME
    [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 183 - 194
  • [7] On reverse Hilbert-type inequalities
    Xu, Biao
    Wang, Xu-Huan
    Wei, Wei
    Wang, Haoxiang
    [J]. JOURNAL OF INEQUALITIES AND APPLICATIONS, 2014,