Enforcing role based access control model with multimedia signatures

被引:6
|
作者
Al Bouna, Bechara [1 ]
Chbeir, Richard [1 ]
Marrara, Stefania [2 ]
机构
[1] Univ Burgundy, CNRS, LE21, F-21078 Dijon, France
[2] Univ Milan, Dept Informat Technol, I-26013 Crema, CR, Italy
关键词
Access control model; Multimedia signatures;
D O I
10.1016/j.sysarc.2008.10.003
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently ubiquitous technology has invaded almost every aspect of the modern life. Several application domains, have integrated ubiquitous technology to make the management of resources a dynamic task. However, the need for adequate and enforced authentication and access control models to provide safe access to sensitive information remains a critical matter to address in such environments. Many security models were proposed in the literature thus few were able to provide adaptive access decisions based on the environmental changes. In this paper, we propose an approach based on our previous work [B.A. Bouna, R. Chbeir, S. Marrara, A multimedia access control language for virtual and ambient intelligence environments, In Secure Web Services (2007) 111-120] to enforce current role based access control models [M.J. Moyer, M. Ahama, Generalized role-based access control, in: Proceedings of International Conference on Distributed Computing Systems (ICDCS), Phoenix, Arizona, USA, 2001. pp. 391-398] using multimedia objects in a dynamic environment. In essence, multimedia objects tend to be complex, memory and time consuming nevertheless they provide interesting information about users and their context (user surrounding, his moves and gesture, people nearby, etc.). The idea behind our approach is to attribute to roles and permissions, multimedia signatures in which we integrate conditions based on users' context information described using multimedia objects in order to limit role activation and the abuse of permissions in a given environment. We also describe our architecture which extends the known XACML [XACML, XACML Profile for Role Based Access Control (RBAC), http://docs.oasis-open.org/xacml/cd-xacml-rbac-profile-01.pdf.2008] terminology to incorporate multimedia signatures. We provide an overview of a possible implementation of the model to illustrate how it could be valuable once integrated in an intelligent environment. (C) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:264 / 274
页数:11
相关论文
共 50 条
  • [11] Semantic Role Based Access Control Model
    Semenova, N. A.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2012, 16 (02): : 50 - 64
  • [12] A role based access control model for agent based control systems
    Drouineaud, M
    Lüder, A
    Sohr, K
    INDIN 2003: IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, PROCEEDINGS, 2003, : 307 - 311
  • [13] Enforcing Access Control in Web-Based Social Networks
    Carminati, Barbara
    Ferrari, Elena
    Perego, Andrea
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 13 (01)
  • [14] Enforcing Separation of Duty in Attribute Based Access Control Systems
    Jha, Sadhana
    Sural, Shamik
    Atluri, Vijayalakshmi
    Vaidya, Jaideep
    INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 61 - 78
  • [15] THE EVALUATION AND COMPARATIVE ANALYSIS OF ROLE BASED ACCESS CONTROL AND ATTRIBUTE BASED ACCESS CONTROL MODEL
    Aftab, Muhammad Umar
    Qin, Zhiguang
    Zakria
    Ali, Safeer
    Pirah
    Khan, Jalaluddin
    2018 15TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2018, : 35 - 39
  • [16] A NOVEL ATTRIBUTE-BASED ACCESS CONTROL MODEL FOR MULTIMEDIA SOCIAL NETWORKS
    Zhang, Z.
    Han, L.
    Li, C.
    Wang, J.
    NEURAL NETWORK WORLD, 2016, 26 (06) : 543 - 557
  • [17] Role signatures for access control in open distributed systems
    Crampton, Jason
    Lim, Hoon Wei
    PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 205 - +
  • [18] A Role and Context Based Access Control Model with UML
    Bao, Yubin
    Song, Jie
    Wang, Daling
    Shen, Derong
    Yu, Ge
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1175 - 1180
  • [19] A Role Based Coordination Model with Types for Access Control
    Zhang, Yaying
    2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 3, PROCEEDINGS, 2009, : 152 - 156
  • [20] A Role-Based Workflow Access Control Model
    Zhang Wen-dong
    Zhang Kai-ji
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 1136 - 1139