Combination of Duty and Historical Constraints in Role-Based Access Control

被引:0
|
作者
Hosseini, Ali [1 ]
Azgomi, Mohammad Abdollahi [2 ]
机构
[1] Iran Univ Sci & Technol, E Learning Ctr, ICT Grp, Tehran, Iran
[2] Iran Univ Sci & Technol, Sch Comp Engn, Tehran, Iran
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Constraints are an important topic in any access control mechanism. Always, there are demands for defining new constraints or generalizing the existing ones in order to better managing and controlling organizations and specifying new policies. Among access control models, role-based access control (RBAC) is very useful and is continuously under development. In this paper, we propose a new constraint in the RBAC model based on dependent roles that we call combination of duty (CD). Furthermore, static and dynamic types of this constraint are also defined. In addition, these constraints and the two existing constraints in RBAC model (i.e. static and dynamic separation of duty (SD)) are generalized in the base of history as static historical SD, dynamic historical SD, static historical CD and dynamic historical CD.
引用
收藏
页码:156 / +
页数:2
相关论文
共 50 条
  • [1] Mining constraints in role-based access control
    Ma, Xiaopu
    Li, Ruixuan
    Lu, Zhengding
    Wang, Wei
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 87 - 96
  • [2] A formal model for role-based access control with constraints
    Giuri, L
    Iglio, P
    [J]. 9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 136 - 145
  • [3] Reliability of separation of duty in ANSI standard role-based access control
    Esna-Ashari, M.
    Rabiee, H. R.
    Mirian-Hosseinabadi, S. H.
    [J]. SCIENTIA IRANICA, 2011, 18 (06) : 1416 - 1424
  • [4] Analysis of enhanced separation of duty in role-based access control model
    Zhang, ZK
    Geng, YP
    Li, TY
    Xiao, JG
    [J]. Proceedings of the 11th Joint International Computer Conference, 2005, : 69 - 72
  • [5] Permission-Based Separation of Duty in Dynamic Role-Based Access Control Model
    Aftab, Muhammad Umar
    Qin, Zhiguang
    Hundera, Negalign Wake
    Ariyo, Oluwasanmi
    Zakria
    Ngo Tung Son
    Dinh, Tran Van
    [J]. SYMMETRY-BASEL, 2019, 11 (05):
  • [6] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [7] Role-based access control in DCOM
    Ahn, GJ
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
  • [8] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    [J]. COMPUTER, 2012, 45 (06) : 81 - 88
  • [9] Delegation in role-based access control
    Jason Crampton
    Hemanth Khambhammettu
    [J]. International Journal of Information Security, 2008, 7 : 123 - 136
  • [10] Practical Role-Based Access Control
    Galante, Victoria
    [J]. INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73