Preventing Illegal Information Flow Based on Role-Based Access Control Model

被引:0
|
作者
Enokido, Toaloya [1 ]
Takizawa, Makoto [2 ]
机构
[1] Rissho Univ, Tokyo, Japan
[2] Seikei Univ, Musashino, Tokyo, Japan
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the role-based access control (RBAC) model, authorized access requests are specified in roles. However; illegal information flow might occur as the well known confinement problem. We first define legal, independent, illegal, and possibly illegal types of information flow relations, R-1 double right arrow R-2, R-1 parallel to R-2, R-1 hooked right arrow R-2, and R-1 -> R-2 among role families R-1 and R-2, respectively. Suppose a transaction T-1 with a role family R-1 precedes T-2 with R-2 in a schedule, i.e. for every pair of conflicting methods op(1) and op(2) from T-1 and T-2, respectively, op(1) is performed prior to op(2). Here, if R-1 double right arrow R-2 or R-1 parallel to R-2 hold, no illegal information flow occur. Otherwise, illegal information flow might occur. Hence, T-2 cannot be performed. In this paper, we discuss the locking protocol for synchronizing conflicting transactions so that no illegal information flow occur based oil the information flow relations. In addition, we discuss when the role-based locks are released.
引用
收藏
页码:242 / +
页数:3
相关论文
共 50 条
  • [1] A Synchronization Protocol to Prevent Illegal Information Flow Based on Maximal Roles in the Role-Based Access Control Model
    Hayashi, Shohei
    Nakamura, Shigenari
    Duolikun, Dilawaer
    Enokido, Tomoya
    Takizawa, Makoto
    [J]. ADVANCES ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, BWCCA-2018, 2019, 25 : 525 - 533
  • [2] Synchronization Protocols to Prevent Illegal Information Flow in Role-based Access Control Systems
    Nakamura, Shigenari
    Doulikun, Dilewaer
    Aikebaier, Ailixier
    Enokido, Tomoya
    Takizawa, Makoto
    [J]. 2014 EIGHTH INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS (CISIS),, 2014, : 279 - 286
  • [3] Information flow control among objects in role-based access control model
    Izaki, K
    Tanaka, K
    Takizawa, M
    [J]. DATABASE AND EXPERT SYSTEMS APPLICATIONS, 2001, 2113 : 299 - 308
  • [4] A legal information flow (LIF) scheduler based on role-based access control model
    Enokido, Tomoya
    Barolli, Valbona
    Takizawa, Makoto
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) : 906 - 912
  • [5] A role-based access control model for information mediation
    Yang, L
    Ege, RK
    Ezenwoye, O
    Kharma, Q
    [J]. PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 277 - 282
  • [6] A read-write abortion protocol to prevent illegal information flow in role-based access control systems
    Nakamura, Shigenari
    Duolikun, Dilawaer
    Enokido, Tomoya
    Takizawa, Makoto
    [J]. INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2016, 6 (01) : 43 - 53
  • [7] Information flow control in role-based model for distributed objects
    Izaki, K
    Tanaka, K
    Takizawa, M
    [J]. PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, 2001, : 363 - 370
  • [8] Role-based Information Flow Control Models
    Nakamura, Shigenari
    Doulikun, Dilewaer
    Aikebaier, Ailixier
    Enokido, Tomoya
    Takizawa, Makoto
    [J]. 2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 1140 - 1147
  • [9] Role-based access control model for GIS
    Pan, Yuqing
    Sheng, Yehua
    Zhou, Jieyu
    [J]. GEOINFORMATICS 2007: GEOSPATIAL INFORMATION TECHNOLOGY AND APPLICATIONS, PTS 1 AND 2, 2007, 6754
  • [10] A Role-Based Workflow Access Control Model
    Zhang Wen-dong
    Zhang Kai-ji
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 1136 - 1139