Modeling of the role-based access control policy with constraints using description logic

被引:0
|
作者
Chae, Junghwa [1 ]
机构
[1] Ecole Polytech, Montreal, PQ H3C 3A7, Canada
关键词
role-based access control; constraints; object class hierarchy; description logic;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security policies form a collection of access restrictions on objects and resources. In this paper, we introduce an access control model with constraints that are common in typical information systems. This access control model is based on the role-based access control policy. It is modified to represent object classes and their hierarchies. The formalization of the proposed policy and constraints is performed using a logical approach based on description logics. Several access control constraints are discussed. The capability of the proposed model to formalize object-based constraints is demonstrated.
引用
收藏
页码:500 / 511
页数:12
相关论文
共 50 条
  • [1] Description of Temporal Constraints Using Semantic Web in Role-Based Access Control
    Tanihira, Kazushi
    Sakamoto, Yusuke
    Kobayashi, Hiromi
    [J]. KNOWLEDGE-BASED SOFTWARE ENGINEERING, 2006, 140 : 186 - 195
  • [2] Modal logic for role-based access control
    Kosiyatrakul, T
    Older, S
    Chin, SK
    [J]. COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 179 - 193
  • [3] Mining constraints in role-based access control
    Ma, Xiaopu
    Li, Ruixuan
    Lu, Zhengding
    Wang, Wei
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 87 - 96
  • [4] A formal model for role-based access control with constraints
    Giuri, L
    Iglio, P
    [J]. 9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 136 - 145
  • [5] Role-Based Access Control Modeling and Validation
    Haraty, Ramzi A.
    Naous, Mirna
    [J]. 2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
  • [6] Policy storage for role-based access control systems
    Belokosztolszki, A
    Eyers, DM
    Wang, W
    Moody, K
    [J]. TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 196 - 201
  • [7] Policy analysis for Administrative Role-Based Access Control
    Sasturkar, Amit
    Yang, Ping
    Stoller, Scott D.
    Ramakrishnan, C. R.
    [J]. THEORETICAL COMPUTER SCIENCE, 2011, 412 (44) : 6208 - 6234
  • [8] Modeling role-based access control using a relational database tool
    Chiang, Chia-Chu
    Bayrak, Coskun
    [J]. PROCEEDINGS OF THE 2008 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION, 2008, : 7 - 10
  • [9] Modeling role-based access control using parameterized UML models
    Kim, DK
    Ray, I
    France, R
    Li, N
    [J]. FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, PROCEEDINGS, 2004, 2984 : 180 - 193
  • [10] Combination of Duty and Historical Constraints in Role-Based Access Control
    Hosseini, Ali
    Azgomi, Mohammad Abdollahi
    [J]. 2009 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2009, : 156 - +