Specification and enforcement of the general user authorization query problem in role based access control system

被引:0
|
作者
机构
[1] Ma, Xiaopu
[2] Liu, Yan
[3] Zhao, Li
[4] Lan, Yihua
[5] Lu, Jianfeng
来源
Ma, Xiaopu | 1600年 / Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands卷 / 06期
关键词
Complexity analysis - RBAC - Role-based Access Control - Running time - SAT - SAT solvers - User authorization query;
D O I
10.2174/1874444301406010692
中图分类号
学科分类号
摘要
The User Authorization Query (UAQ) problem in Role Based Access Control (RBAC) is assigning roles to users in an appropriate manner. That is, take as input a set of permissions that a user requests to have in a session, and determine whether there exists an optimum set of roles to active. However the existing definition of UAQ is inadequate, it only considers the number of permissions whereas the number of roles is also equally important, has been largely ignored. In addition, little attention has been paid to the complexity analysis of the UAQ problem with the consideration of the both permission and role numbers in the literature. In this paper, we give a general definition of UAQ with the name of GUAQ by introducing the consideration for the number of both permissions and roles, and then study the computational complexity of the GUAQ problem into three subcases. Furthermore, we propose an approach for finding a safe resolution for GUAQ, which employ the preprocessing and reduction to SAT solver that greatly reduce the running time. © Ma et al.
引用
收藏
相关论文
共 50 条
  • [1] User Authorization in a System with a Role-Based Access Control on the Basis of the Analytic Hierarchy Process
    Belim, S. V.
    Belim, S. Yu.
    Bogachenko, N. F.
    Kabanov, A. N.
    [J]. 2017 XI INTERNATIONAL IEEE SCIENTIFIC AND TECHNICAL CONFERENCE DYNAMICS OF SYSTEMS, MECHANISMS AND MACHINES (DYNAMICS), 2017,
  • [2] AQUA: An Efficient Solver for the User Authorization Query Problem
    Armando, Alessandro
    Gazzarata, Giorgia A.
    Turkmen, Fatih
    [J]. SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, : 153 - 154
  • [3] Towards complexity analysis of User Authorization Query problem in RBAC
    Lu, Jianfeng
    Joshi, James B. D.
    Jin, Lei
    Liu, Yiding
    [J]. COMPUTERS & SECURITY, 2015, 48 : 116 - 130
  • [4] An Approach of Query Request Authorization Process for the Access Control System to XML Documents
    Islam, Khandoker Asadul
    Watanabe, Yoshimichi
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (02): : 32 - 38
  • [5] DC Proposal: Knowledge Based Access Control Policy Specification and Enforcement
    Kirrane, Sabrina
    [J]. SEMANTIC WEB - ISWC 2011, PT II, 2011, 7032 : 293 - 300
  • [6] Specification, Validation, and Enforcement of a Generalized Spatio-Temporal Role-Based Access Control Model
    Abdunabi, Ramadan
    Al-Lail, Mustafa
    Ray, Indrakshi
    France, Robert B.
    [J]. IEEE SYSTEMS JOURNAL, 2013, 7 (03): : 501 - 515
  • [7] Towards an Efficient Approximate Solution for the Weighted User Authorization Query Problem
    Lu, Jianfeng
    Wang, Zheng
    Xu, Dewu
    Tang, Changbing
    Han, Jianmin
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (08): : 1762 - 1769
  • [8] Specification & Enforcement of Access Control in Information & Communication Systems
    El Kalam, Anas Abou
    [J]. 2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2580 - 2585
  • [9] Specification and enforcement of access control in heterogeneous distributed applications
    Fink, T
    Koch, M
    Oancea, C
    [J]. WEB SERVICES -ICWS-EUROPE 2003, PROCEEDINGS, 2003, 2853 : 88 - 100
  • [10] Supporting Negative Authorization in Spatiotemporal Role Based Access Control
    Mondal, Samrat
    Sural, Shamik
    [J]. 2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & COMMUNICATIONS (NETCOM 2009), 2009, : 422 - 427