Uni-ARBAC: A Unified Administrative Model for Role-Based Access Control

被引:5
|
作者
Biswas, Prosunjit [1 ]
Sandhu, Ravi [1 ]
Krishnan, Ram [1 ]
机构
[1] Univ Texas San Antonio, Inst Cyber Secur, San Antonio, TX 78249 USA
来源
关键词
D O I
10.1007/978-3-319-45871-7_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many of the advantages of Role Based Access Control (RBAC) accrue from the flexibility of its administrative models. Over the past two decades, several administrative models have been proposed to manage user-role, permission-role and in some cases role-role relations. These models are based on different administrative principles and bring inherent advantages and disadvantages. In this paper, we present a unified model, named Uni-ARBAC, for administering user-role and permission-role relations by combining many of the administrative principles and novel concepts from prior models. For example, instead of administering individual permissions Uni-ARBAC combines permissions into tasks which are assigned to roles as a unit. Slightly differently, users are assigned to user-pools from where individual users are assigned to roles. The central concept of Uni-ARBAC is to integrate user-role and task-role administration into a more manageable unit called an Administrative Unit (AU). AUs partition roles, tasks and user-pools and they are organized in a rooted tree hierarchy. Administrative users are assigned to AUs with possibility of restricting their authority to user-role assignment or task-role assignment. While most existing models assume existence of administrative roles for managing regular roles, we present an approach for engineering AUs based on structured partitioning of roles and tasks.
引用
收藏
页码:218 / 230
页数:13
相关论文
共 50 条
  • [31] Role-based access control in DCOM
    Ahn, GJ
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
  • [32] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    [J]. COMPUTER, 2012, 45 (06) : 81 - 88
  • [33] Role hierarchy model for role-based access control and its application
    Zhong, Hua
    Feng, Yulin
    Jiang, Hongan
    [J]. 2000, (11):
  • [34] Role-based access control hierarchy model in distributed system
    Hong, Fan
    Wu, Min
    [J]. 2003, Huazhong University of Science and Technology (31):
  • [35] Delegation in role-based access control
    Jason Crampton
    Hemanth Khambhammettu
    [J]. International Journal of Information Security, 2008, 7 : 123 - 136
  • [36] Practical Role-Based Access Control
    Galante, Victoria
    [J]. INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73
  • [37] Spatial role-based access control model for wireless networks
    Hansen, F
    Oleshchuk, V
    [J]. 2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 2093 - 2097
  • [38] Role delegation in role-based access control
    Na, SangYeob
    Cheon, SuhHyun
    [J]. Proceedings of the ACM Workshop on Role-Based Access Control, 2000, : 39 - 44
  • [39] Role-based access control in JavaTM
    Fondazione Ugo Bordoni, Roma, Italy
    [J]. Proceedings of the ACM Workshop on Role-Based Access Control, 1998, : 91 - 100
  • [40] Generalized Role-Based Access Control
    Moyer, MJ
    Ahamad, M
    [J]. 21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2001, : 391 - 398