Enforcing role based access control model with multimedia signatures

被引:6
|
作者
Al Bouna, Bechara [1 ]
Chbeir, Richard [1 ]
Marrara, Stefania [2 ]
机构
[1] Univ Burgundy, CNRS, LE21, F-21078 Dijon, France
[2] Univ Milan, Dept Informat Technol, I-26013 Crema, CR, Italy
关键词
Access control model; Multimedia signatures;
D O I
10.1016/j.sysarc.2008.10.003
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently ubiquitous technology has invaded almost every aspect of the modern life. Several application domains, have integrated ubiquitous technology to make the management of resources a dynamic task. However, the need for adequate and enforced authentication and access control models to provide safe access to sensitive information remains a critical matter to address in such environments. Many security models were proposed in the literature thus few were able to provide adaptive access decisions based on the environmental changes. In this paper, we propose an approach based on our previous work [B.A. Bouna, R. Chbeir, S. Marrara, A multimedia access control language for virtual and ambient intelligence environments, In Secure Web Services (2007) 111-120] to enforce current role based access control models [M.J. Moyer, M. Ahama, Generalized role-based access control, in: Proceedings of International Conference on Distributed Computing Systems (ICDCS), Phoenix, Arizona, USA, 2001. pp. 391-398] using multimedia objects in a dynamic environment. In essence, multimedia objects tend to be complex, memory and time consuming nevertheless they provide interesting information about users and their context (user surrounding, his moves and gesture, people nearby, etc.). The idea behind our approach is to attribute to roles and permissions, multimedia signatures in which we integrate conditions based on users' context information described using multimedia objects in order to limit role activation and the abuse of permissions in a given environment. We also describe our architecture which extends the known XACML [XACML, XACML Profile for Role Based Access Control (RBAC), http://docs.oasis-open.org/xacml/cd-xacml-rbac-profile-01.pdf.2008] terminology to incorporate multimedia signatures. We provide an overview of a possible implementation of the model to illustrate how it could be valuable once integrated in an intelligent environment. (C) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:264 / 274
页数:11
相关论文
共 50 条
  • [21] Task-role-based access control model
    Oh, S
    Park, S
    INFORMATION SYSTEMS, 2003, 28 (06) : 533 - 562
  • [22] Atom-Role-Based Access Control Model
    Cai, Weihong
    Huang, Richeng
    Hou, Xiaoli
    Wei, Gang
    Xiao, Shui
    Chen, Yindong
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (07): : 1908 - 1917
  • [23] A Flexible Role Based Access Control Engine Model
    Wang Zhen-wu
    MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 2477 - 2480
  • [24] An Extended Access Control Model based On Role And Department
    Chen, Gang
    Gu, Jinguang
    Chen, Jianxun
    FBIE: 2008 INTERNATIONAL SEMINAR ON FUTURE BIOMEDICAL INFORMATION ENGINEERING, PROCEEDINGS, 2008, : 300 - 303
  • [25] A Collaborative Task Role Based Access Control Model
    Amine Madani, Mohamed
    Erradi, Mohammed
    Benkaouz, Yahya
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2016, 11 (06): : 348 - 358
  • [26] Role-based access control model for GIS
    Pan, Yuqing
    Sheng, Yehua
    Zhou, Jieyu
    GEOINFORMATICS 2007: GEOSPATIAL INFORMATION TECHNOLOGY AND APPLICATIONS, PTS 1 AND 2, 2007, 6754
  • [27] Field access analysis for enforcing access control policies
    Lehmann, Kathrin
    Thiemann, Peter
    EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 337 - 351
  • [28] Hybrid Role Hierarchy for the Extended Role Based Access Control Model
    Luo, Zhenxing
    Chen, Jing
    Lin, Zuoquan
    2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2, 2008, : 555 - 556
  • [29] A Role and Node Based Access Control Model for Industrial Control Network
    Wang, Shenwen
    Yang, Yonghui
    Xia, Tao
    Zhang, Weiyan
    ICCSP 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, 2018, : 89 - 94
  • [30] Cryptographic Protocols for Enforcing Relationship-based Access Control Policies
    Pang, Jun
    Zhang, Yang
    39TH ANNUAL IEEE COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2015), VOL 2, 2015, : 484 - 493