Combination of Duty and Historical Constraints in Role-Based Access Control

被引:0
|
作者
Hosseini, Ali [1 ]
Azgomi, Mohammad Abdollahi [2 ]
机构
[1] Iran Univ Sci & Technol, E Learning Ctr, ICT Grp, Tehran, Iran
[2] Iran Univ Sci & Technol, Sch Comp Engn, Tehran, Iran
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Constraints are an important topic in any access control mechanism. Always, there are demands for defining new constraints or generalizing the existing ones in order to better managing and controlling organizations and specifying new policies. Among access control models, role-based access control (RBAC) is very useful and is continuously under development. In this paper, we propose a new constraint in the RBAC model based on dependent roles that we call combination of duty (CD). Furthermore, static and dynamic types of this constraint are also defined. In addition, these constraints and the two existing constraints in RBAC model (i.e. static and dynamic separation of duty (SD)) are generalized in the base of history as static historical SD, dynamic historical SD, static historical CD and dynamic historical CD.
引用
收藏
页码:156 / +
页数:2
相关论文
共 50 条
  • [41] Garbled role-based access control in the cloud
    Masoom Alam
    Naina Emmanuel
    Tanveer Khan
    Yang Xiang
    Houcine Hassan
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 1153 - 1166
  • [42] Adding Attributes to Role-Based Access Control
    Kuhn, D. Richard
    Coyne, Edward J.
    Weil, Timothy R.
    [J]. COMPUTER, 2010, 43 (06) : 79 - 81
  • [43] Cryptographic Role-Based Access Control, Reconsidered
    Liu, Bin
    Michalas, Antonis
    Warinschi, Bogdan
    [J]. PROVABLE AND PRACTICAL SECURITY, PROVSEC 2022, 2022, 13600 : 282 - 289
  • [44] λ-RBAC:: Programming with role-based access control
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, 2006, 4052 : 456 - 467
  • [45] Role-Based Access Control Models for Android
    Talegaon, Samir
    Krishnan, Ram
    [J]. 2020 SECOND IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2020), 2020, : 179 - 188
  • [46] λ-RBAC: PROGRAMMING WITH ROLE-BASED ACCESS CONTROL
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    [J]. LOGICAL METHODS IN COMPUTER SCIENCE, 2008, 4 (01)
  • [47] Concurrency and Time in Role-Based Access Control
    Chiang, Chia-Chu
    Bayrak, Coskun
    [J]. ADVANCES IN INFORMATION SECURITY AND ITS APPLICATION, 2009, 36 : 37 - 42
  • [48] Role-Based Access Control Modeling and Validation
    Haraty, Ramzi A.
    Naous, Mirna
    [J]. 2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
  • [49] Static Enforcement of Role-Based Access Control
    Ali, Asad
    Fernandez, Maribel
    [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2014, (163): : 36 - 50
  • [50] Minimum User Requirement in Role Based Access Control with Separation of Duty Constraints
    Roy, Arindam
    Sural, Shamik
    Majumdar, Arun Kumar
    [J]. 2012 12TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA), 2012, : 386 - 391