Role-based access control and the access control matrix

被引:0
|
作者
Saunders, G [1 ]
Hitchens, M
Varadharajan, V
机构
[1] Univ Sydney, Sch Informat Technol, Sydney, NSW 2006, Australia
[2] Macquarie Univ, Dept Comp, N Ryde, NSW, Australia
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Access Matrix is a useful model for understanding the behaviour and properties of access control systems. While the matrix is rarely implemented, access control in real systems is usually based on access control mechanisms, such as access control lists or capabilities, that have clear relationships with the matrix model. In recent times a great deal of interest has been shown in Role Based Access Control (RBAC) models. However, the relationship between RBAC models and the Access Matrix is not clear. In this paper we present a model of RBAC based on the Access Matrix which makes the relationships between the two explicit. In the process of constructing this model, some fundamental similarities between certain capability models and RBAC are revealed. In particular, we outline a proof that RBAC and the ACM are equivalent with respect to the policies they can represent. From this we conclude that, in a similar way to access lists and capabilities, RBAC is a derivation of the Access Matrix model.
引用
收藏
页码:145 / 157
页数:13
相关论文
共 50 条
  • [31] λ-RBAC:: Programming with role-based access control
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, 2006, 4052 : 456 - 467
  • [32] λ-RBAC: PROGRAMMING WITH ROLE-BASED ACCESS CONTROL
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    LOGICAL METHODS IN COMPUTER SCIENCE, 2008, 4 (01)
  • [33] Role-Based Access Control Modeling and Validation
    Haraty, Ramzi A.
    Naous, Mirna
    2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
  • [34] Role-Based Access Control Models for Android
    Talegaon, Samir
    Krishnan, Ram
    2020 SECOND IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2020), 2020, : 179 - 188
  • [35] Concurrency and Time in Role-Based Access Control
    Chiang, Chia-Chu
    Bayrak, Coskun
    ADVANCES IN INFORMATION SECURITY AND ITS APPLICATION, 2009, 36 : 37 - 42
  • [36] Static Enforcement of Role-Based Access Control
    Ali, Asad
    Fernandez, Maribel
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2014, (163): : 36 - 50
  • [37] Spatial context in role-based access control
    Zhang, Hong
    He, Yeping
    Shi, Zhiguo
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2006, PROCEEDINGS, 2006, 4296 : 166 - 178
  • [38] A Role-Based Workflow Access Control Model
    Zhang Wen-dong
    Zhang Kai-ji
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 1136 - 1139
  • [39] Integrating Attributes into Role-Based Access Control
    Rajpoot, Qasim Mahmood
    Jensen, Christian Damsgaard
    Krishnan, Ram
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXIX, 2015, 9149 : 242 - 249
  • [40] Mining constraints in role-based access control
    Ma, Xiaopu
    Li, Ruixuan
    Lu, Zhengding
    Wang, Wei
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 87 - 96