Integrating object oriented role-based access control model with mandatory access control principles

被引:0
|
作者
Zhang, CN [1 ]
Yang, CG [1 ]
机构
[1] Univ Regina, TRLabs, Regina, SK S4S 0A2, Canada
关键词
information flow analysis; object oriented; role-based access control model (ORBAC); MAC; RBAC; DAC; confinement problem; message filtering algorithm;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, an Object Oriented Role-based Access Control model (ORBAC) is introduced and the confinement problem that may occur on the ORBAC based system is illustrated. In order to solve the problem, a technique called information flow analysis is proposed. Moreover, based on the information flow technique and the principle of mandatory access control (MAC) principles, a message filtering algorithm and a role set assignment method are developed to deal with the confinement problem on ORBAC.
引用
收藏
页码:40 / 49
页数:10
相关论文
共 50 条
  • [31] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    [J]. COMPUTER, 2012, 45 (06) : 81 - 88
  • [32] Delegation in role-based access control
    Jason Crampton
    Hemanth Khambhammettu
    [J]. International Journal of Information Security, 2008, 7 : 123 - 136
  • [33] Practical Role-Based Access Control
    Galante, Victoria
    [J]. INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73
  • [34] Generalized Role-Based Access Control
    Moyer, MJ
    Ahamad, M
    [J]. 21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2001, : 391 - 398
  • [35] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (02) : 123 - 136
  • [36] Fuzzy Role-Based Access Control
    Martinez-Garcia, Carles
    Navarro-Arribas, Guillermo
    Borrell, Joan
    [J]. INFORMATION PROCESSING LETTERS, 2011, 111 (10) : 483 - 487
  • [37] Role-based access control in JavaTM
    Fondazione Ugo Bordoni, Roma, Italy
    [J]. Proceedings of the ACM Workshop on Role-Based Access Control, 1998, : 91 - 100
  • [38] Study of Role-based Access Control
    Cao Yonghui
    [J]. EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5209 - 5212
  • [39] Migrating to role-based access control
    Brooks, K
    [J]. FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 71 - 81
  • [40] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    [J]. COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +