Implementation of the Authorization Management with RBAC in the Usage Control Model

被引:0
|
作者
Cai, Hui [1 ]
Li, Peiwu [1 ]
机构
[1] Nanchang Hangkong Univ, Sch Software, Nanchang, Peoples R China
关键词
access control; usage control; authorization; ABC model; assignment and revocation of the right;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The usage control which involves traditional access control, trust management and digital right management is a comprehensive model. For the reasons included high abstract and the authorization hard to be managed, a new model was putted forward to administrate usage control model-RUCON model. Six functions of authorizations, which are user-role auto-assignment based on role-rule, role-hierarchy assignment, permissions -role assignment, usage-rule, obligations and conditions were defined in the new model. In order to simplify the management the new model adopted the advantages of the RBAC model. In the RUCON model the assignment and revocation of right are administrated automatically through the medium of roles. The formal description of the RUCON model was given as well.
引用
收藏
页码:179 / 182
页数:4
相关论文
共 50 条
  • [21] Platform for access control management in information system based on extended RBAC model
    Poniszewska-Maranda, Aneta
    12TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2010), 2011, : 510 - 517
  • [22] Implementation of Access Control Model for Distributed Information Systems Using Usage Control
    Poniszewska-Maranda, Aneta
    SECURITY AND INTELLIGENT INFORMATION SYSTEMS, 2012, 7053 : 54 - 67
  • [23] A Usage Control Platform based on Rule Templates and Authorization Credentials
    Stihler, Maicon
    Santin, Altair O.
    Marcon, Arlindo L., Jr.
    2015 XXXIII BRAZILIAN SYMPOSIUM ON COMPUTER NETWORKS AND DISTRIBUTED SYSTEMS, 2015, : 50 - 59
  • [24] A Family of RBAC-Based Workflow Authorization Models
    HONG Fan
    WuhanUniversityJournalofNaturalSciences, 2005, (01) : 324 - 328
  • [25] Active Authorization Rules for Enforcing RBAC with Spatial Characteristics
    Tang, Zhu
    Ju, Shiguang
    Chen, Weihe
    ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 632 - 636
  • [26] Safety and Availability Checking for User Authorization Queries in RBAC
    Jian-feng Lu
    Jian-min Han
    Wei Chen
    Jin-Wei Hu
    International Journal of Computational Intelligence Systems, 2012, 5 : 860 - 867
  • [27] On the Complexity of Authorization of Temporal RBAC in Cloud Computing Service
    Wu, Wenkang
    Tang, Zhuo
    Li, Renfa
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1567 - 1572
  • [28] Safety and Availability Checking for User Authorization Queries in RBAC
    Lu, Jian-feng
    Han, Jian-min
    Chen, Wei
    Hu, Jin-Wei
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2012, 5 (05) : 860 - 867
  • [29] An Efficient Framework for User Authorization Queries in RBAC Systems
    Wickramaarachchi, Guneshi T.
    Qardaji, Wahbeh H.
    Li, Ninghui
    SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 23 - 31
  • [30] On the Complexity of Authorization in RBAC under Qualification and Security Constraints
    Sun, Yuqing
    Wang, Qihua
    Li, Ninghui
    Bertino, Elisa
    Atallah, Mikhail J.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (06) : 883 - 897