Constructing role-based access control and delegation based on hierarchical IBS

被引:6
|
作者
Wang, Jin [1 ]
Li, Daxing [1 ]
Li, Qiang [2 ]
Xi, Bai [2 ]
机构
[1] Shandong Univ, Inst Network & Informat Secur, Jinan 250100, Peoples R China
[2] Jilin Univ, Coll Comp Sci & Technol, Changchun, Peoples R China
关键词
D O I
10.1109/NPC.2007.106
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication and authorization are crucial for information and system security. Role-based delegation based on role-based access control (RBAC) can act as an efficient means of authorization management in distributed collaborative environment. In this paper, we present a scheme that integrates hierarchical identity-based signature (Hierarchical IBS) technique to perform role-based access control and role-based delegation. In our suggestion, original user-role assignment relation can be regarded as a particular form of one-depth delegation. We eliminate the use of digital certificates, and handle the multi-depth role-based delegation based on hierarchical identity-based signature scheme [8]. Our access control process can provide both aspects of user authentication and role-based authorization simultaneously, so the independent authentication procedure is eliminated We also prove the security of our scheme in the random oracle model.
引用
收藏
页码:112 / +
页数:2
相关论文
共 50 条
  • [1] Delegation in role-based access control
    Jason Crampton
    Hemanth Khambhammettu
    [J]. International Journal of Information Security, 2008, 7 : 123 - 136
  • [2] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (02) : 123 - 136
  • [3] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    [J]. COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +
  • [4] Combining authentication with role-based access control based on IBS
    Wang, Jin
    Yu, Jia
    Li, Daxing
    Jia, Zhongtian
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1475 - 1480
  • [5] Hierarchical role-based access control development
    Kolegov, D. N.
    [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2012, 17 (03): : 70 - 76
  • [6] Towards Trustworthy Delegation in Role-Based Access Control Model
    Toahchoodee, Manachai
    Xie, Xing
    Ray, Indrakshi
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 379 - 394
  • [7] Applying hierarchical and role-based access control to XML documents
    Crampton, Jason
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2006, 21 (05): : 325 - 338
  • [8] Delegation in a role-based organization
    Pacheco, O
    Santos, F
    [J]. DEONTIC LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2004, 3065 : 209 - 227
  • [9] Hierarchical Role-Based Access Control with Homomorphic Encryption for Database as a Service
    Hingwe, Kamlesh Kumar
    Bhanu, S. Mary Saira
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT ICT4SD 2015, VOL 2, 2016, 409 : 437 - 448
  • [10] An Administrative Model for Role-Based Access Control Using Hierarchical Namespace
    Xia, Luning
    Jing, Jiwu
    [J]. PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS 2006, SECTIONS 1-8, 2006, : 181 - 188