An organizational structure-based administration model for decentralized access control

被引:0
作者
Oh, Sejong [1 ]
Byun, Changwoo
Park, Seog
机构
[1] Dankook Univ, Dept Comp Sci, Cheonan 330714, South Korea
[2] Sogang Univ, Dept Comp Sci, Seoul 121742, South Korea
关键词
access control; role; organization; organizational structure; security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose an effective administration model using organizational structure for a decentralized role-based access control environment. Access control administration is a critical issue for large organizations and information systems. A large organization needs decentralized access control by multiple security officers because it has many users and information objects, and a single security officer cannot do all the work. If an organization has multiple security officers, managing them is another important security task. The task includes defining the authority scope and keeping the administrative operations of each security officer legal. Access control administration means controlling security officers' administrative work. ARBAC is a typical model for access control administration. ARBAC defines authority scope using the role hierarchy, and it leads many shortcomings. Our proposed model uses the organizational structure as a basis for defining authority scope and keeping administrative operations legal. The proposed model overcomes the shortcomings of ARBAC, and offers a clear rationale for access control administration.
引用
收藏
页码:1465 / 1483
页数:19
相关论文
共 21 条
  • [1] AMOROSO EG, 1994, FUNDAMENTAL COMPUTER
  • [2] Framework for role-based delegation models
    Barka, E
    Sandhu, R
    [J]. 16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 168 - 176
  • [3] Crampton J., 2003, ACM Transactions on Information and Systems Security, V6, P201, DOI 10.1145/762476.762478
  • [4] Modelling contexts in the Or-BAC model
    Cuppens, F
    Miège, A
    [J]. 19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 416 - 425
  • [5] CUPPENS F, 2003, WORKSH MET SEC INT F, P754
  • [6] CUPPENS F, 2003, P IEEE 4 INT NAT WOR, P120
  • [7] FERNANDEZ EB, 1997, P 2 ACM WORKSH ROL B, P121
  • [8] Ferraiolo D. E., 1995, Proceedings. 11th Annual Computer Security Applications Conference, P241
  • [9] The uses of role hierarchies in access control
    Moffett, JD
    Lupu, EC
    [J]. FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 153 - 160
  • [10] Task-role-based access control model
    Oh, S
    Park, S
    [J]. INFORMATION SYSTEMS, 2003, 28 (06) : 533 - 562