PuRBAC: Purpose-Aware Role-Based Access Control

被引:0
|
作者
Masoumzadeh, Amirreza [1 ]
Joshi, James B. D. [1 ]
机构
[1] Univ Pittsburgh, Sch Informat Sci, Pittsburgh, PA 15260 USA
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Several researches in recent years have pointed out that for the proper enforcement of privacy policies within enterprise data handling practices the privacy requirements should be captured in access control systems. In this paper, we extend the role-based access control (RBAC) model to capture privacy requirements of an organization. The proposed purpose-aware RBAC extension treats purpose its a. Central entity in RBAC. The model assigns permissions to roles based oil purpose related to privacy policies. Furthermore, the use of purpose as a separate entity reduces the complexity of policy administration by avoiding complex rules and applying entity assignments, coherent, with the idea followed by RBAC. Our model also supports conditions (constraints and obligations) with clear semantics for enforcement. and leverages hybrid hierarchies for roles and purposes for enforcing fine grained purpose and role based access control to ensure privacy protection.
引用
收藏
页码:1104 / 1121
页数:18
相关论文
共 50 条
  • [1] Purpose Scan: A Purpose-Aware Access Method
    Praciano, Francisco D. B. S.
    Amora, Paulo R. P.
    Abreu, Italo C.
    Machado, Javam C.
    [J]. HETEROGENEOUS DATA MANAGEMENT, POLYSTORES, AND ANALYTICS FOR HEALTHCARE, DMAH 2022, 2022, 13814 : 24 - 36
  • [2] Privacy-Aware Role-Based Access Control
    Ni, Qun
    Bertino, Elisa
    Lobo, Jorge
    Brodie, Carolyn
    Karat, Clare-Marie
    Karat, John
    Trombetta, Alberto
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (03)
  • [3] Privacy-Aware Role-Based Access Control
    Ni, Qun
    Bertino, Elisa
    Lobo, Jorge
    Calo, Seraphin B.
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (04) : 35 - 43
  • [4] A Purpose-Involved Role-Based Access Control Model
    Wang, Yingjie
    Zhou, Zhihong
    Li, Jianhua
    [J]. FOUNDATIONS OF INTELLIGENT SYSTEMS (ISKE 2013), 2014, 277 : 1119 - 1131
  • [5] Role-based access control
    [J]. Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [6] LRBAC: A Location-aware Role-Based Access Control model
    Ray, Indrakshi
    Kumar, Mahendra
    Yu, Lijun
    [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 147 - +
  • [7] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [8] Role-Based Access Control and the Access Control Matrix
    Saunders, G.
    Hitchens, M.
    Varadharajan, V.
    [J]. 2001, Association for Computing Machinery (35):
  • [9] A secure, constraint-aware role-based access control interoperation framework
    Baracaldo N.
    Masoumzadeh A.
    Joshi J.
    [J]. Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011, 2011, : 200 - 207
  • [10] Context-Aware Role-based Access Control in Pervasive Computing Systems
    Kulkarni, Devdatta
    Tripathi, Anand
    [J]. SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 113 - 122