The RBAC based privilege management for authorization of wireless networks

被引:0
|
作者
Park, DG [1 ]
Lee, YR [1 ]
机构
[1] Soonchunhyang Univ, Coll Engn, Dept Informat & Technol Engn, Asan, Choongnam, South Korea
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
M-commerce have grown rapidly, it is very important to determine whether an identity is permitted to access a resource in mobile environments. In this paper we propose RBAC based Wireless Privilege Management Infrastructure(WPMI) model and Wireless Attribute Certificate(WAC) for authorization in mobile communication. All access control decisions are driven by an authorization policy, which is itself stored in an WAC. Authorization policies are written in XML according to a DTD that has been published at XML.org. Finally we show the effectiveness of the proposed RBAC by applying it to an example of M-commerce service.
引用
收藏
页码:314 / 326
页数:13
相关论文
共 50 条
  • [31] Active Authorization Rules for Enforcing RBAC with Spatial Characteristics
    Tang, Zhu
    Ju, Shiguang
    Chen, Weihe
    ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 632 - 636
  • [32] Safety and Availability Checking for User Authorization Queries in RBAC
    Jian-feng Lu
    Jian-min Han
    Wei Chen
    Jin-Wei Hu
    International Journal of Computational Intelligence Systems, 2012, 5 : 860 - 867
  • [33] On the Complexity of Authorization of Temporal RBAC in Cloud Computing Service
    Wu, Wenkang
    Tang, Zhuo
    Li, Renfa
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1567 - 1572
  • [34] Safety and Availability Checking for User Authorization Queries in RBAC
    Lu, Jian-feng
    Han, Jian-min
    Chen, Wei
    Hu, Jin-Wei
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2012, 5 (05) : 860 - 867
  • [35] An Efficient Framework for User Authorization Queries in RBAC Systems
    Wickramaarachchi, Guneshi T.
    Qardaji, Wahbeh H.
    Li, Ninghui
    SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 23 - 31
  • [36] On the Complexity of Authorization in RBAC under Qualification and Security Constraints
    Sun, Yuqing
    Wang, Qihua
    Li, Ninghui
    Bertino, Elisa
    Atallah, Mikhail J.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (06) : 883 - 897
  • [37] Application of Fine-grained Core RBAC Model in Privilege Management of Electric Power ERP
    Tian, Junjing
    Bi, Yan
    ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION TECHNOLOGY 2010 (APYCCT 2010), 2010, : 263 - 266
  • [38] SpartanRPC: Remote Procedure Call Authorization in Wireless Sensor Networks
    Chapin, Peter
    Skalka, Christian
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2014, 17 (02)
  • [39] Handling least privilege problem and role mining in RBAC
    Huang, Hejiao
    Shang, Feng
    Liu, Jinling
    Du, Hongwei
    JOURNAL OF COMBINATORIAL OPTIMIZATION, 2015, 30 (01) : 63 - 86
  • [40] Security-aware authorization and verification based data aggregation model for wireless sensor networks
    Nels, S. Ninisha
    Singh, J. Amar Pratap
    INTERNATIONAL JOURNAL OF NUMERICAL MODELLING-ELECTRONIC NETWORKS DEVICES AND FIELDS, 2021, 34 (03)