Specification and enforcement of the general user authorization query problem in role based access control system

被引:0
|
作者
机构
[1] Ma, Xiaopu
[2] Liu, Yan
[3] Zhao, Li
[4] Lan, Yihua
[5] Lu, Jianfeng
来源
Ma, Xiaopu | 1600年 / Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands卷 / 06期
关键词
Complexity analysis - RBAC - Role-based Access Control - Running time - SAT - SAT solvers - User authorization query;
D O I
10.2174/1874444301406010692
中图分类号
学科分类号
摘要
The User Authorization Query (UAQ) problem in Role Based Access Control (RBAC) is assigning roles to users in an appropriate manner. That is, take as input a set of permissions that a user requests to have in a session, and determine whether there exists an optimum set of roles to active. However the existing definition of UAQ is inadequate, it only considers the number of permissions whereas the number of roles is also equally important, has been largely ignored. In addition, little attention has been paid to the complexity analysis of the UAQ problem with the consideration of the both permission and role numbers in the literature. In this paper, we give a general definition of UAQ with the name of GUAQ by introducing the consideration for the number of both permissions and roles, and then study the computational complexity of the GUAQ problem into three subcases. Furthermore, we propose an approach for finding a safe resolution for GUAQ, which employ the preprocessing and reduction to SAT solver that greatly reduce the running time. © Ma et al.
引用
收藏
相关论文
共 50 条
  • [21] An RDF triple based access authorization specification considering subsumption relationships
    Kim, Jaehoon
    Jung, Kangsoo
    Park, Seog
    [J]. 2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOP, VOLS 1 AND 2, 2008, : 382 - 389
  • [22] User Stories and Parameterized Role Based Access Control
    Sobieski, Scibor
    Zielinski, Bartosz
    [J]. MODEL AND DATA ENGINEERING, MEDI 2015, 2015, 9344 : 311 - 319
  • [23] Access control enforcement on query-aware encrypted cloud databases
    Ferretti, Luca
    Colajanni, Michele
    Marchetti, Mirco
    [J]. 2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 2, 2013, : 717 - 722
  • [24] Access Control Metamodel for Policy Specification and Enforcement: From Conception to Formalization
    Kashmar, Nadine
    Adda, Mehdi
    Atieh, Mirna
    Ibrahim, Hussein
    [J]. 12TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT) / THE 4TH INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40) / AFFILIATED WORKSHOPS, 2021, 184 : 887 - 892
  • [25] Authentication and Authorization: Domain Specific Role Based Access Control Using Ontology
    Katal, Avita
    Gupta, Pranjal
    Wazid, Mohammad
    Goudar, R. H.
    Mittal, Abhishek
    Panwar, Sakshi
    Joshi, Sanjay
    [J]. 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO 2013), 2013, : 439 - 444
  • [26] Use case-driven Role Based Access Control security authorization
    Lin juan
    Ren Shengbing
    Jiang ping
    Mahammed, Jalloh
    [J]. PROCEEDINGS OF THE 26TH CHINESE CONTROL CONFERENCE, VOL 6, 2007, : 392 - +
  • [27] Efficient Access Enforcement in Distributed Role-Based Access Control (RBAC) Deployments
    Tripunitara, Mahesh V.
    Carbunar, Bogdan
    [J]. SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 155 - 164
  • [28] Hardware-Enhanced Distributed Access Enforcement for Role-Based Access Control
    Bloom, Gedare
    Simha, Rahul
    [J]. PROCEEDINGS OF THE 19TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'14), 2014, : 5 - 15
  • [29] The resource access authorization route problem in a collaborative manufacturing system
    Qiang Liu
    Xinhui Zhang
    Xindu Chen
    Lei Wang
    [J]. Journal of Intelligent Manufacturing, 2014, 25 : 413 - 425
  • [30] The resource access authorization route problem in a collaborative manufacturing system
    Liu, Qiang
    Zhang, Xinhui
    Chen, Xindu
    Wang, Lei
    [J]. JOURNAL OF INTELLIGENT MANUFACTURING, 2014, 25 (03) : 413 - 425