Embedding role-based access control model in object-oriented systems to protect privacy

被引:18
|
作者
Chou, SC [1 ]
机构
[1] Natl Dong Hwa Univ, Dept Comp Sci & Informat Engn, Shoufeng 974, Hualien, Taiwan
关键词
information flow control; security; protect privacy; object-oriented systems;
D O I
10.1016/S0164-1212(02)00158-9
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The role-based access control (RBAC) approach has been recognized as useful in information security and many RBAC models have been proposed. Current RBAC researches focus on developing new models or enhancing existing models. In our research, we developed an RBAC model that can be embedded in object-oriented systems to control information flows (i.e. to protect privacy) within the systems. This paper proposes the model. The model, which is named OORBAC, is an extension of RBAC96. OORBAC offers the following features: (a) precisely control information flows among objects, (b) control method invocation through argument sensitivity, (c) allow purpose-oriented method invocation and prevent leakage within an object, (d) precisely control write access, and (e) avoid Trojan horses. We implemented a prototype for OORBAC using JAVA as the target language. The implementation resulted in a language named OORBACL, which can be used to implement secure applications. We evaluated OORBAC using experiments. The evaluation results are also shown in this paper. (C) 2002 Elsevier Inc. All rights reserved.
引用
收藏
页码:143 / 161
页数:19
相关论文
共 50 条
  • [1] Research on object-oriented role-based access control model
    Luo, JY
    He, DK
    PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT'2003, PROCEEDINGS, 2003, : 132 - 135
  • [2] Role-Based Access Control Model as Applied to Object-Oriented Applications
    Oleynik, Pavel P.
    2016 DYNAMICS OF SYSTEMS, MECHANISMS AND MACHINES (DYNAMICS), 2016,
  • [3] An object-oriented organizational model to support dynamic role-based access control in electronic commerce
    Cheng, EC
    DECISION SUPPORT SYSTEMS, 2000, 29 (04) : 357 - 369
  • [4] Access control model in object-oriented systems
    Izaki, K
    Tanaka, K
    Takizawa, M
    SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS: WORKSHOPS, PROCEEDINGS, 2000, : 69 - 74
  • [5] Integrating object oriented role-based access control model with mandatory access control principles
    Zhang, CN
    Yang, CG
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2003, 43 (03) : 40 - 49
  • [6] An object oriented role-based access control model for secure domain environments
    Department of Electrical and Computer Engineering, Ryerson University, Toronto, ON, M5B 2K3, Canada
    Int. J. Netw. Secur., 2007, 1 (10-16):
  • [7] Role-based exploration of object-oriented programs
    Demsky, B
    Rinard, M
    ICSE 2002: PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 2002, : 313 - 324
  • [8] Extensible and reusable role-based object-oriented security
    Demurjian, SA
    Ting, TC
    Price, M
    Hu, MY
    DATABASE SECURITY VOLUME X - STATUS AND PROSPECTS, 1997, : 288 - 307
  • [9] A privacy enhanced role-based access control model for enterprises
    Yang, CG
    Zhang, CN
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1012 - 1021
  • [10] Role-based access control for CORBA distributed object systems
    Obelheiro, RR
    Fraga, JS
    PROCEEDINGS OF THE SEVENTH IEEE INTERNATIONAL WORKSHOP ON OBJECT-ORIENTED REAL-TIME DEPENDABLE SYSTEMS, 2002, : 53 - 60