Role based access control design using three-way formal concept analysis

被引:0
|
作者
Chandra Mouliswaran Subramanian
Aswani Kumar Cherukuri
Chandrasekar Chelliah
机构
[1] Vellore Institute of Technology,School of Information Technology and Engineering
[2] Periyar University,Department of Computer Science
来源
International Journal of Machine Learning and Cybernetics | 2018年 / 9卷
关键词
Access control; Role based access control; 3WCA; Three-way concept; Three-way concept lattice;
D O I
暂无
中图分类号
学科分类号
摘要
Role based access control (RBAC) is one of the popular access control models. On representing the policy behind RBAC, the literatures investigate the use of various knowledge representation techniques such as Descriptive logics, Formal Concept Analysis (FCA), Ontology etc. Based on the input of binary access control table, the existing knowledge representation techniques on RBAC derives two-way decisions whether to permit the access request or not. It works well when single element in the set of elements of a constituent of RBAC initiates the access request. Consider the scenario of multiple distinct elements in the set of elements of a constituent of RBAC initiate the collective access request to a set of elements in other constituent of RBAC. In many cases of this scenario, some elements possess but not all of the elements possess the permission to access all elements in other subset of a constituent of RBAC. On this situation, the collective access decision to those multiple distinct elements in the set of elements of a RBAC constituent appears in three forms such as permit, deny and non-commitment. Three-way formal concept analysis (3WCA) is an emerging knowledge representation technique which provides two types of three-way concepts and their lattices to enable three-way decisions from the binary information table. At this juncture, it is more suitable to apply 3WCA on representing the RBAC policy to enable three-way decisions instead of existing two-way decisions in classical FCA and triadic FCA. The main objective of this paper is to propose a methodology for modelling RBAC using 3WCA and attain its distinctive merits. Our discussion is on two lines of inquiry. We present on how 3WCA can provide suitable representation of RBAC policy and whether this representation follows role hierarchy and constraints of RBAC.
引用
收藏
页码:1807 / 1837
页数:30
相关论文
共 50 条
  • [31] Adjunctive three-way concepts from positive and negative concepts in lattice-valued formal contexts
    Deng, Tingquan
    Long, Binghan
    Xu, Weihua
    Yao, Yiyu
    INTERNATIONAL JOURNAL OF APPROXIMATE REASONING, 2023, 161
  • [32] Formal Z specifications of several flat Role-Based Access Control models
    Abdallah, Ali E.
    Khayat, Etienne J.
    30TH ANNUAL IEEE/NASA SOFTWARE ENGINEERING WORKSHOP, PROCEEDINGS, 2006, : 282 - +
  • [33] Security analysis for temporal role based access control
    Uzun, Emre
    Atluri, Vijayalakshmi
    Vaidya, Jaideep
    Sural, Shamik
    Ferrara, Anna
    Parlato, Gennaro
    Madhusudan, P.
    JOURNAL OF COMPUTER SECURITY, 2014, 22 (06) : 961 - 996
  • [34] An analysis of expressiveness and design issues for the generalized temporal role-based access control model
    Joshi, JBD
    Bertino, E
    Ghafoor, A
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (02) : 157 - 175
  • [35] Three Level Access Control Model Based on Role, Department and Task
    Xu Heng
    Zhao Song-zheng
    Zhang Xiao-di
    Gao Na
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12547 - 12550
  • [36] Formal Description of Trust-based Access control
    Ma Xiaoning
    2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 1, 2011, : 383 - 385
  • [37] Formal Description of Trust-based Access control
    Ma Xiaoning
    2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 555 - 560
  • [38] Role Based Access Control Architectural Design Issues in Large Organizations
    Asaf, Zeeshan
    Asad, Muhammad
    Ahmed, Shafique
    Rasheed, Waqas
    Bashir, Tariq
    2014 INTERNATIONAL CONFERENCE ON OPEN SOURCE SYSTEMS AND TECHNOLOGIES (ICOSST), 2014, : 197 - 205
  • [39] Mining positive and negative rules via one-sided fuzzy three-way concept lattices
    Hu, Zhiyong
    Shao, Mingwen
    Mi, Jusheng
    Wu, Weizhi
    FUZZY SETS AND SYSTEMS, 2024, 479
  • [40] Using NFS to implement role-based access control
    Gustafsson, M
    Deligny, B
    Shahmehri, N
    SIXTH IEEE WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 1997, : 299 - 304