An Administrative Model for Role-Based Access Control Using Hierarchical Namespace

被引:0
|
作者
Xia, Luning [1 ]
Jing, Jiwu [1 ]
机构
[1] Chinese Acad Sci, State Key Lab Informat Secur, Beijing, Peoples R China
关键词
RBAC; RBAC96; ARBAC97; N-RBAC; Namespace;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Access Control is an important mechanism of information security. Role-Based Access Control is a famous access control approach with good flexibility. RBAC96 and ARBAC97 are classical RBAC models. The ARBAC97 model facilitates decentralized administration of RBAC. However, ARBAC97 has some shortcomings in the case of being used in an organization with autonomous subsidiaries. The member of an administrative role can operate directly in the role range of a junior administrative role, which violates the autonomy of subsidiaries. We propose a new model named N-RBAC to overcome this weakness. In N-RBAC, roles are arranged according to a hierarchical namespace structure. Thus the role hierarchy is constructed in a local space instead of in a global space. The N-RBAC model does a better work in decentralized role administration in those organizations composed of autonomous subsidiaries.
引用
收藏
页码:181 / 188
页数:8
相关论文
共 50 条
  • [11] Constructing role-based access control and delegation based on hierarchical IBS
    Wang, Jin
    Li, Daxing
    Li, Qiang
    Xi, Bai
    [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 112 - +
  • [12] Symbolic reachability analysis for parameterized administrative role-based access control
    Stoller, Scott D.
    Yang, Ping
    Gofman, Mikhail I.
    Ramakrishnan, C. R.
    [J]. COMPUTERS & SECURITY, 2011, 30 (2-3) : 148 - 164
  • [13] A Role-Based Administrative Model for Administration of Heterogeneous Access Control Policies and its Security Analysis
    Singh, Mahendra Pratap
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. INFORMATION SYSTEMS FRONTIERS, 2021,
  • [14] A formal model for Role-Based Access Control using graph transformation
    Koch, M
    Mancini, LV
    Parisi-Presicce, F
    [J]. COMPUTER SECURITY - ESORICS 2000, PROCEEDINGS, 2000, 1895 : 122 - 139
  • [15] A role-based access control model for information mediation
    Yang, L
    Ege, RK
    Ezenwoye, O
    Kharma, Q
    [J]. PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 277 - 282
  • [16] A formal model for parameterized role-based access control
    Abdallah, AE
    Khayat, EJ
    [J]. FORMAL ASPECTS IN SECURITY AND TRUST, 2005, 173 : 233 - 246
  • [17] A formal model for role-based access control with constraints
    Giuri, L
    Iglio, P
    [J]. 9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 136 - 145
  • [18] Attributes Enhanced Role-Based Access Control Model
    Rajpoot, Qasim Mahmood
    Jensen, Christian Damsgaard
    Krishnan, Ram
    [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2015, 9264 : 3 - 17
  • [19] The Research for Spatial Role-Based Access Control Model
    Zou, Zhiwen
    Chen, Changqian
    Ju, Shiguang
    Chen, Jiming
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2010, PT 4, PROCEEDINGS, 2010, 6019 : 296 - 308
  • [20] A role-based multilevel security access control model
    Pan, L
    Zhang, CN
    Yang, CG
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2006, 46 (03) : 1 - 10