Implementation of the Authorization Management with RBAC in the Usage Control Model

被引:0
|
作者
Cai, Hui [1 ]
Li, Peiwu [1 ]
机构
[1] Nanchang Hangkong Univ, Sch Software, Nanchang, Peoples R China
关键词
access control; usage control; authorization; ABC model; assignment and revocation of the right;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The usage control which involves traditional access control, trust management and digital right management is a comprehensive model. For the reasons included high abstract and the authorization hard to be managed, a new model was putted forward to administrate usage control model-RUCON model. Six functions of authorizations, which are user-role auto-assignment based on role-rule, role-hierarchy assignment, permissions -role assignment, usage-rule, obligations and conditions were defined in the new model. In order to simplify the management the new model adopted the advantages of the RBAC model. In the RUCON model the assignment and revocation of right are administrated automatically through the medium of roles. The formal description of the RUCON model was given as well.
引用
收藏
页码:179 / 182
页数:4
相关论文
共 50 条
  • [31] An OWL-based approach for RBAC with negative authorization
    Heilili, Nuermaimaiti
    Chen, Yang
    Zhao, Chen
    Luo, Zhenxing
    Lin, Zuoquan
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, 2006, 4092 : 164 - 175
  • [32] A unified authorization platform based on RBAC4WAS model for web application system integration
    Zhu, QM
    Li, PF
    Su, Z
    Peide, Q
    2005 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS, 2005, : 505 - 509
  • [33] Concurrent Usage Control Implementation Verification Using the SPIN Model Checker
    Rajkumar, P. V.
    Ghosh, S. K.
    Dasgupta, P.
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 214 - +
  • [34] An authorization model for collaborative access control
    Ma, Chen-hua
    Lu, Guo-dong
    Qiu, Jiong
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2010, 11 (09): : 699 - 717
  • [35] An authorization and access control model for workflow
    Chaari, S
    Biennier, F
    Ben Amar, C
    Favrel, J
    ISCCSP : 2004 FIRST INTERNATIONAL SYMPOSIUM ON CONTROL, COMMUNICATIONS AND SIGNAL PROCESSING, 2004, : 141 - 148
  • [36] An authorization model for collaborative access control
    Chen-hua Ma
    Guo-dong Lu
    Jiong Qiu
    Journal of Zhejiang University SCIENCE C, 2010, 11 : 699 - 717
  • [37] RBAC with ABS Implementation Practicalities for RBAC Integrity Policies
    Kiviharju, Mikko
    2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 500 - 509
  • [39] An Extended RBAC Model for Uniform Implementation of Role Hierarchy and Constraint
    Ren, Yi
    Xiao, Zhiting
    Guo, Sipei
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 169 - +
  • [40] Time-Continuous Authorization of Network Resources Based on Usage Control
    Martini, Barbara
    Mori, Paolo
    Martinelli, Fabio
    Lazouski, Aliaksandr
    Castoldi, Piero
    TRUSTWORTHY INTERNET, 2011, : 235 - 245