A framework for role-based access control in group communication systems

被引:0
|
作者
Nita-Rotaru, C [1 ]
Li, N [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we analyze the requirements access control mechanisms must fulfill in the context of group communication and define a framework for supporting fine-grained access control in client-server group communication systems. Our framework combines role-based access control mechanisms with environment parameters (time, IP address, etc.) to provide support for a wide range of applications with very different requirements. While the access control policy is defined by the application, its efficient enforcement is performed by the group communication system.
引用
收藏
页码:522 / 529
页数:8
相关论文
共 50 条
  • [1] A Role-based Secure Group Communication Framework
    Bian, Jiang
    Topaloglu, Umit
    Seker, Remzi
    Bayrak, Coskun
    Chiang, Chia-Chu
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON SYSTEM OF SYSTEMS ENGINEERING (SOSE), 2008, : 111 - 116
  • [2] On Formalizing and Normalizing Role-Based Access Control Systems
    Power, David
    Slaymaker, Mark
    Simpson, Andrew
    [J]. COMPUTER JOURNAL, 2009, 52 (03): : 305 - 325
  • [3] A role-based access control policy verification framework for real-time systems
    Shafiq, B
    Masood, A
    Joshi, J
    Ghafoor, A
    [J]. WORDS 2005: 10th IEEE International Workshop on Object-Oriented Real-Time Dependable, Proceedings, 2005, : 13 - 20
  • [4] Policy storage for role-based access control systems
    Belokosztolszki, A
    Eyers, DM
    Wang, W
    Moody, K
    [J]. TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 196 - 201
  • [5] On formalizing and normalizing role-based access control systems
    Power, David
    Slaymaker, Mark
    Simpson, Andrew
    [J]. Computer Journal, 2009, 52 (03): : 305 - 325
  • [6] A comprehensive modeling framework for role-based access control policies
    Ben Fadhel, Ameni
    Bianculli, Domenico
    Briand, Lionel
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2015, 107 : 110 - 126
  • [7] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [8] Conformance Testing of Temporal Role-Based Access Control Systems
    Masood, Ammar
    Ghafoor, Arif
    Mathur, Aditya
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2010, 7 (02) : 144 - 158
  • [9] On Automated Role-Based Access Control Assessment in Enterprise Systems
    Walker, Andrew
    Svacina, Jan
    Simmons, Johnathan
    Cerny, Tomas
    [J]. INFORMATION SCIENCE AND APPLICATIONS, 2020, 621 : 375 - 385
  • [10] An Extended Role-Based Access Control Model for CSCW Systems
    Chen, Bing
    [J]. MACHINING AND ADVANCED MANUFACTURING TECHNOLOGY X, 2010, 431-432 : 577 - 582