Implementation of the Authorization Management with RBAC in the Usage Control Model

被引:0
|
作者
Cai, Hui [1 ]
Li, Peiwu [1 ]
机构
[1] Nanchang Hangkong Univ, Sch Software, Nanchang, Peoples R China
关键词
access control; usage control; authorization; ABC model; assignment and revocation of the right;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The usage control which involves traditional access control, trust management and digital right management is a comprehensive model. For the reasons included high abstract and the authorization hard to be managed, a new model was putted forward to administrate usage control model-RUCON model. Six functions of authorizations, which are user-role auto-assignment based on role-rule, role-hierarchy assignment, permissions -role assignment, usage-rule, obligations and conditions were defined in the new model. In order to simplify the management the new model adopted the advantages of the RBAC model. In the RUCON model the assignment and revocation of right are administrated automatically through the medium of roles. The formal description of the RUCON model was given as well.
引用
收藏
页码:179 / 182
页数:4
相关论文
共 50 条
  • [1] Design and Implementation of Authorization System Based on RBAC
    Li, Furong
    Wu, Haitao
    2015 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT HUMAN-MACHINE SYSTEMS AND CYBERNETICS IHMSC 2015, VOL I, 2015, : 502 - 504
  • [2] Improvement and implementation of RBAC access control model
    Information College, Capital University of Economics and Business, Beijing, China
    Proc. - Int. Conf. Manage. e-Commer. e-Govern., ICMeCG, 1600, (110-115):
  • [3] A new authorization model for workflow management system using the RPI-RBAC model
    Lee, SY
    Kim, YM
    Noh, BN
    Lee, HH
    COMPUTATIONAL SCIENCE - ICCS 2004, PT 1, PROCEEDINGS, 2004, 3036 : 639 - 643
  • [4] The RBAC based privilege management for authorization of wireless networks
    Park, DG
    Lee, YR
    ADVANCES IN WEB-AGE INFORMATION MANAGEMENT, PROCEEDINGS, 2003, 2762 : 314 - 326
  • [5] THE DESIGN OF THE SECURE TRANSMISSION AND AUTHORIZATION MANAGEMENT SYSTEM BASED ON RBAC
    Lu, Guoqing
    Zhao, Lingling
    Yang, Kuihe
    PROCEEDINGS OF 2014 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOL 1, 2014, : 103 - 108
  • [6] Role-based Access Control (RBAC) Authorization in Kubernetes
    Rostami G.
    Journal of ICT Standardization, 2023, 11 (03): : 237 - 260
  • [7] Authorization Specification of Usage Control with CPN
    Li Pei-Wu
    2008 INTERNATIONAL WORKSHOP ON INFORMATION TECHNOLOGY AND SECURITY, 2008, : 88 - 92
  • [8] Authorization Recycling in RBAC Systems
    Wei, Qiang
    Beznosov, Konstantin
    Crampton, Jason
    Ripeanu, Matei
    SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 63 - 72
  • [9] Authorization constraints specification of RBAC
    Han, Lilong
    Liu, Qingtan
    Yang, Zongkai
    INFORMATION SECURITY APPLICATIONS, 2007, 4867 : 266 - 276
  • [10] FWAM: A flexible workflow authorization model using extended RBAC
    Yang, Le
    Choi, Yongsun
    Choi, Myeonggil
    Zhao, Xinlei
    PROCEEDINGS OF THE 2008 12TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS I AND II, 2008, : 625 - +