A formal model for Role-Based Access Control using graph transformation

被引:0
|
作者
Koch, M [1 ]
Mancini, LV [1 ]
Parisi-Presicce, F [1 ]
机构
[1] Univ Roma La Sapienza, Dipartimento Sci Informaz, I-00198 Rome, Italy
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Role-Based Access Control (RBAC) is supported directly or in a closely related form, by a number of products. This paper presents a formalization of RBAC using graph transformations which is a graphical specification technique based on a generalization to nonlinear structures of classical string grammars. The proposed formalization provides an intuitive description for the manipulation of graph structures as they occur in information systems access control, a specification of static and dynamic consistency conditions on graphs and graph trasformations, a uniform treatment of user roles and administrative roles, and a detailed analysis of the decentralization of administrative roles. Moreover, the properties of a given RBAC specification can be verified by employing one of the graph transformation tools available.
引用
收藏
页码:122 / 139
页数:18
相关论文
共 50 条
  • [21] A role-based access control model for XML repositories
    He, H
    Wong, RK
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS ENGINEERING, VOL I, 2000, : 138 - 145
  • [22] An improved Role-based workflow Access Control Model
    Zhao, Hui
    Fang, Zhiyi
    Xu, Peng
    Zhao, Lianyu
    Liu, Jin
    Wang, Tianyang
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 551 - 556
  • [23] Role-based Access Control Model for Multicast in MANET
    Mu Haibing
    Zhang Changlun
    Zeng Ping
    [J]. ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, : 816 - 819
  • [24] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [25] Role-based access control on the web using LDAP
    Park, JS
    Ahn, GJ
    Sandhu, R
    [J]. DATABASE AND APPLICATION SECURITY XV, 2002, 87 : 19 - 30
  • [26] Using NFS to implement role-based access control
    Gustafsson, M
    Deligny, B
    Shahmehri, N
    [J]. SIXTH IEEE WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 1997, : 299 - 304
  • [27] Role-based access control using neural network
    Chae, SH
    Kim, W
    Kim, DK
    [J]. 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 36 - 40
  • [28] Formal Z specifications of several flat Role-Based Access Control models
    Abdallah, Ali E.
    Khayat, Etienne J.
    [J]. 30TH ANNUAL IEEE/NASA SOFTWARE ENGINEERING WORKSHOP, PROCEEDINGS, 2006, : 282 - +
  • [29] A formal role-based access control model for security policies in multi-domain mobile networks
    Unal, D.
    Caglayan, M. U.
    [J]. COMPUTER NETWORKS, 2013, 57 (01) : 330 - 350
  • [30] Role-based access control in DCOM
    Ahn, GJ
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184