Role-Based Access Control Models for Android

被引:0
|
作者
Talegaon, Samir [1 ]
Krishnan, Ram [1 ]
机构
[1] Univ Texas San Antonio, Dept Elect & Comp Engn, San Antonio, TX 78249 USA
关键词
role-based; access control; android;
D O I
10.1109/TPS-ISA50397.2020.00033
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Android uses runtime permissions to alert users of application resource usage. Only a limited portion of Android permissions are allowed to be managed by the users. This is made essential, because Android assigns permissions directly to applications, and the number of applications and permissions is high. However, due to this tradeoff, users are restricted from managing all the aspects of their own devices. Android itself groups permissions based on their functionality; however, these groups are immutable and non-overlapping, which confers a rigidity to the permission system. Prior work in adapting RBAC to Android exists but deviates from the standardized NIST RBAC and does not include sessions, a key component of RBAC, used to mitigate the exposure of system resources. So, to fully understand the benefits RBAC offers for Android, and to mitigate its permissions management problem, we propose three new models for RBAC in Android. Our models are aimed to address the issue of user permission management in conjunction with flexibility of being able to assign permissions to either users, applications, or app-components.
引用
收藏
页码:179 / 188
页数:10
相关论文
共 50 条
  • [1] Future directions in role-based access control models
    Sandhu, R
    [J]. INFORMATION ASSURANCE IN COMPUTER NETWORKS: METHODS, MODELS AND ARCHITECTURES FOR NETWORK SECURITY, PROCEEDINGS, 2001, 2052 : 22 - 26
  • [2] Delta Analysis of Role-Based Access Control Models
    Leitner, Maria
    [J]. COMPUTER AIDED SYSTEMS THEORY, PT 1, 2013, 8111 : 507 - 514
  • [3] Role-based access control
    [J]. Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [4] An Improved Role-based Access to Android Applications with JCHR
    Bistarelli, Stefano
    Costantino, Gianpiero
    Martinelli, Fabio
    Santini, Francesco
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 341 - 348
  • [5] Role-Based Access Control Models in E-Government
    Yu, Zheng
    [J]. FUZZY SYSTEMS, KNOWLEDGE DISCOVERY AND NATURAL COMPUTATION SYMPOSIUM (FSKDNC 2013), 2013, : 499 - 506
  • [6] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [7] Role-Based Access Control and the Access Control Matrix
    Saunders, G.
    Hitchens, M.
    Varadharajan, V.
    [J]. 2001, Association for Computing Machinery (35):
  • [8] Role-based access control in DCOM
    Ahn, GJ
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
  • [9] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    [J]. COMPUTER, 2012, 45 (06) : 81 - 88
  • [10] Practical Role-Based Access Control
    Galante, Victoria
    [J]. INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73