The RBAC based privilege management for authorization of wireless networks

被引:0
|
作者
Park, DG [1 ]
Lee, YR [1 ]
机构
[1] Soonchunhyang Univ, Coll Engn, Dept Informat & Technol Engn, Asan, Choongnam, South Korea
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
M-commerce have grown rapidly, it is very important to determine whether an identity is permitted to access a resource in mobile environments. In this paper we propose RBAC based Wireless Privilege Management Infrastructure(WPMI) model and Wireless Attribute Certificate(WAC) for authorization in mobile communication. All access control decisions are driven by an authorization policy, which is itself stored in an WAC. Authorization policies are written in XML according to a DTD that has been published at XML.org. Finally we show the effectiveness of the proposed RBAC by applying it to an example of M-commerce service.
引用
收藏
页码:314 / 326
页数:13
相关论文
共 50 条
  • [21] Authorization Recycling in Hierarchical RBAC Systems
    Wei, Qiang
    Crampton, Jason
    Beznosov, Konstantin
    Ripeanu, Matei
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)
  • [22] Distributed authentication & authorization mechanism for wireless networks
    Aslam, Muhammad Usman
    Rehman, Asim
    PROCEEDINGS OF THE INMIC 2005: 9TH INTERNATIONAL MULTITOPIC CONFERENCE - PROCEEDINGS, 2005, : 241 - 249
  • [23] The Formalization of Least Privilege Mining in RBAC
    Dong, Lijun
    Kang, Xiaojun
    Song, Jun
    Wang, Maocai
    MATERIALS ENGINEERING FOR ADVANCED TECHNOLOGIES, PTS 1 AND 2, 2011, 480-481 : 1023 - 1027
  • [24] Enable delegation for RBAC with Secure Authorization Certificate
    Zhou, GuangXu
    Demirer, Murat
    Bayrak, Coskun
    Wang, Licheng
    COMPUTERS & SECURITY, 2011, 30 (08) : 780 - 790
  • [25] Policy based management of wireless networks
    State, R
    Vivier, G
    NETWORK CONTROL AND ENGINEERING FOR QOS, SECURITY AND MOBILITY, 2003, 107 : 15 - 26
  • [26] A new authorization model for workflow management system using the RPI-RBAC model
    Lee, SY
    Kim, YM
    Noh, BN
    Lee, HH
    COMPUTATIONAL SCIENCE - ICCS 2004, PT 1, PROCEEDINGS, 2004, 3036 : 639 - 643
  • [27] Greedy Algorithm for Least Privilege in RBAC Model
    Liu, Jinling
    Huang, Hejiao
    Du, Hongwei
    COMBINATORIAL OPTIMIZATION AND APPLICATIONS, 2011, 6831 : 537 - 545
  • [28] RBAC-based Delegation Authorization with Trust Computing and Collaborative Security Strategy
    Sun, Wei
    International Journal of Network Security, 2023, 25 (04) : 666 - 679
  • [29] Stateful Least Privilege Authorization for the Cloud
    Cao, Leo
    Meng, Luoxi
    Stefan, Deian
    Fernandes, Earlence
    PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 3477 - 3494
  • [30] A Negotiated Virtual Role Solution in RBAC Scheme for Group-Based Heterogeneous Wireless Networks
    Chen, Hsing-Chung
    PROCEEDINGS 2015 18TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2015), 2015, : 146 - 150