Role based access control design using three-way formal concept analysis

被引:0
|
作者
Chandra Mouliswaran Subramanian
Aswani Kumar Cherukuri
Chandrasekar Chelliah
机构
[1] Vellore Institute of Technology,School of Information Technology and Engineering
[2] Periyar University,Department of Computer Science
来源
International Journal of Machine Learning and Cybernetics | 2018年 / 9卷
关键词
Access control; Role based access control; 3WCA; Three-way concept; Three-way concept lattice;
D O I
暂无
中图分类号
学科分类号
摘要
Role based access control (RBAC) is one of the popular access control models. On representing the policy behind RBAC, the literatures investigate the use of various knowledge representation techniques such as Descriptive logics, Formal Concept Analysis (FCA), Ontology etc. Based on the input of binary access control table, the existing knowledge representation techniques on RBAC derives two-way decisions whether to permit the access request or not. It works well when single element in the set of elements of a constituent of RBAC initiates the access request. Consider the scenario of multiple distinct elements in the set of elements of a constituent of RBAC initiate the collective access request to a set of elements in other constituent of RBAC. In many cases of this scenario, some elements possess but not all of the elements possess the permission to access all elements in other subset of a constituent of RBAC. On this situation, the collective access decision to those multiple distinct elements in the set of elements of a RBAC constituent appears in three forms such as permit, deny and non-commitment. Three-way formal concept analysis (3WCA) is an emerging knowledge representation technique which provides two types of three-way concepts and their lattices to enable three-way decisions from the binary information table. At this juncture, it is more suitable to apply 3WCA on representing the RBAC policy to enable three-way decisions instead of existing two-way decisions in classical FCA and triadic FCA. The main objective of this paper is to propose a methodology for modelling RBAC using 3WCA and attain its distinctive merits. Our discussion is on two lines of inquiry. We present on how 3WCA can provide suitable representation of RBAC policy and whether this representation follows role hierarchy and constraints of RBAC.
引用
收藏
页码:1807 / 1837
页数:30
相关论文
共 50 条
  • [41] Role-based access control on the web using LDAP
    Park, JS
    Ahn, GJ
    Sandhu, R
    DATABASE AND APPLICATION SECURITY XV, 2002, 87 : 19 - 30
  • [42] Role-based access control using neural network
    Chae, SH
    Kim, W
    Kim, DK
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 36 - 40
  • [43] A Formal Approach Based on Verification and Validation Techniques for Enhancing the Integrity of Concrete Role Based Access Control Policies
    Jaidi, Faouzi
    Ayachi, Faten Labbene
    INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, 369 : 53 - 64
  • [44] Delta Analysis of Role-Based Access Control Models
    Leitner, Maria
    COMPUTER AIDED SYSTEMS THEORY, PT 1, 2013, 8111 : 507 - 514
  • [45] Security Analysis of Administrative Role-Based Access Control Policies with Contextual Information
    Khai Kim Quoc Dinh
    Tuan Duc Tran
    Anh Truong
    FUTURE DATA AND SECURITY ENGINEERING, 2017, 10646 : 243 - 261
  • [46] A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control
    Uddin, Mumina
    Islam, Shareeful
    Al-Nemrat, Ameer
    IEEE ACCESS, 2019, 7 : 166676 - 166689
  • [47] Formal Approach for Authorization in Distributed Business Process Related Task Document Role Based Access Control
    Maroua, Nouioua
    Belhassen, Zouari
    Adel, Alti
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1964 - 1970
  • [48] The Design and Simulation of a New Dynamic Credit and Role based Access Control Strategy
    Gao, Haibo
    Zeng, Wenjuan
    Deng, Xiaohong
    JOURNAL OF COMPUTERS, 2014, 9 (02) : 506 - 511
  • [49] Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework
    Nyame, Gabriel
    Qin, Zhiguang
    INFORMATION, 2020, 11 (06)
  • [50] Access Control in XML Repositories Using a Role-Based Approach
    Chen, Shihn-Yuarn
    Ke, Hao-Ren
    Tsai, Wen-Nung
    Yang, Wei-Pang
    JOURNAL OF INTERNET TECHNOLOGY, 2010, 11 (07): : 1041 - 1056