Integrating object oriented role-based access control model with mandatory access control principles

被引:0
|
作者
Zhang, CN [1 ]
Yang, CG [1 ]
机构
[1] Univ Regina, TRLabs, Regina, SK S4S 0A2, Canada
关键词
information flow analysis; object oriented; role-based access control model (ORBAC); MAC; RBAC; DAC; confinement problem; message filtering algorithm;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, an Object Oriented Role-based Access Control model (ORBAC) is introduced and the confinement problem that may occur on the ORBAC based system is illustrated. In order to solve the problem, a technique called information flow analysis is proposed. Moreover, based on the information flow technique and the principle of mandatory access control (MAC) principles, a message filtering algorithm and a role set assignment method are developed to deal with the confinement problem on ORBAC.
引用
收藏
页码:40 / 49
页数:10
相关论文
共 50 条
  • [1] Research on object-oriented role-based access control model
    Luo, JY
    He, DK
    [J]. PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT'2003, PROCEEDINGS, 2003, : 132 - 135
  • [2] Role-Based Access Control Model as Applied to Object-Oriented Applications
    Oleynik, Pavel P.
    [J]. 2016 DYNAMICS OF SYSTEMS, MECHANISMS AND MACHINES (DYNAMICS), 2016,
  • [3] Integrating Attributes into Role-Based Access Control
    Rajpoot, Qasim Mahmood
    Jensen, Christian Damsgaard
    Krishnan, Ram
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXIX, 2015, 9149 : 242 - 249
  • [4] Integrating Role-Based Access Control Model with Web Server
    Li, Celia
    Yang, Cungang
    Qin, Ling
    Yang, Yiguang
    [J]. 2009 SECOND INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT 2009), 2009, : 615 - 618
  • [5] Applications of the oriented permission role-based access control model
    Chen, Liang
    Crampton, Jason
    [J]. 2007 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2007, : 387 - +
  • [6] Embedding role-based access control model in object-oriented systems to protect privacy
    Chou, SC
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 71 (1-2) : 143 - 161
  • [7] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [8] Object-Specific Role-Based Access Control
    Mundbrod, Nicolas
    Reichert, Manfred
    [J]. INTERNATIONAL JOURNAL OF COOPERATIVE INFORMATION SYSTEMS, 2019, 28 (01)
  • [9] Role-based access control model for GIS
    Pan, Yuqing
    Sheng, Yehua
    Zhou, Jieyu
    [J]. GEOINFORMATICS 2007: GEOSPATIAL INFORMATION TECHNOLOGY AND APPLICATIONS, PTS 1 AND 2, 2007, 6754
  • [10] A Role-Based Workflow Access Control Model
    Zhang Wen-dong
    Zhang Kai-ji
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 1136 - 1139