A General Attribute and Rule Based Role-Based Access Control Model

被引:0
|
作者
朱一群
李建华
张全海
机构
[1] DeptofElectronicEng,ShanghaiJiaotongUniv
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource.This paper analyzes the relationships of resource attributes to user attributes in all policies, and propose a general attribute and rule based role-based access control(GAR-RBAC) model to meet the security needs. The model can dynamically assign users to roles via rules to meet the need of growing numbers of users. These rules use different attribute expression and permission as a part of authorization constraints, and are defined by analyzing relations of resource attributes to user attributes in many access policies that are defined by the enterprise. The model is a general access control model, and can support many access control policies, and also can be used to wider application for service. The paper also describes how to use the GAR-RBAC model in Web service environments.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] A General Attribute and Rule Based Role-Based Access Control Model
    朱一群
    李建华
    张全海
    [J]. Journal of Shanghai Jiaotong University(Science), 2007, (06) : 719 - 724
  • [2] AARBAC: Attribute-Based Administration of Role-Based Access Control
    Ninglekhu, Jiwan L.
    Krishnan, Ram
    [J]. 2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 126 - 135
  • [3] Using attribute certificate to design role-based access control
    Wang, CJ
    Wu, JP
    Duan, HX
    [J]. PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT'2003, PROCEEDINGS, 2003, : 216 - 218
  • [4] A Role-Based Access Control System Using Attribute-Based Encryption
    Wang, Yong
    Ma, Yuan
    Xiang, Keyu
    Liu, Zhenyan
    Li, Ming
    [J]. 2018 INTERNATIONAL CONFERENCE ON BIG DATA AND ARTIFICIAL INTELLIGENCE (BDAI 2018), 2018, : 128 - 133
  • [5] Role-based access control model for GIS
    Pan, Yuqing
    Sheng, Yehua
    Zhou, Jieyu
    [J]. GEOINFORMATICS 2007: GEOSPATIAL INFORMATION TECHNOLOGY AND APPLICATIONS, PTS 1 AND 2, 2007, 6754
  • [6] A Role-Based Workflow Access Control Model
    Zhang Wen-dong
    Zhang Kai-ji
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 1136 - 1139
  • [7] Role-based access control with X.509 attribute certificates
    Chadwick, DW
    Otenko, A
    Ball, E
    [J]. IEEE INTERNET COMPUTING, 2003, 7 (02) : 62 - 69
  • [8] A context, rule and role-based access control model in enterprise pervasive computing environment
    Huang, Xianzhi
    Wang, Haiyang
    Chen, Zhenxiang
    Lin, Jinjiao
    [J]. 2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 497 - +
  • [9] A role-based access control model for information mediation
    Yang, L
    Ege, RK
    Ezenwoye, O
    Kharma, Q
    [J]. PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 277 - 282
  • [10] The Research for Spatial Role-Based Access Control Model
    Zou, Zhiwen
    Chen, Changqian
    Ju, Shiguang
    Chen, Jiming
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2010, PT 4, PROCEEDINGS, 2010, 6019 : 296 - 308