A dynamic access control model

被引:0
|
作者
Narhimene Boustia
Aicha Mokhtari
机构
[1] Saad Dahlab University,
[2] USTHB,undefined
来源
Applied Intelligence | 2012年 / 36卷
关键词
Access control; OrBAC model; Dynamic context; Description logic; Defaults and exceptions; Nonmonotonic reasonner;
D O I
暂无
中图分类号
学科分类号
摘要
The proposed dynamic access control model is based on description logic (DL) augmented with a default (δ) and an exception (ε) operator to capture context features. Currently, this model has an expressivity almost comparable to OrBAC system (OrBAC (Organization Based Access Control) has been formalized in first order logic), all features needed for real attribution of authorization, i.e., assigning authorization to a user according to its role in an organization in a given context. A notable difference of our model is the allowing of composed context, the addition of new context and the deduction of new authorization depending on context.
引用
下载
收藏
页码:190 / 207
页数:17
相关论文
共 50 条
  • [21] A Model for Dynamic Access Control of XML Documents Using Semantics
    Tao Peng
    Jiang Minghua
    Hu Ming
    ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, : 734 - 737
  • [22] Management of access privileges for dynamic access control
    Zhu, Nafei
    Cai, Fangbo
    He, Jingsha
    Zhang, Yixuan
    Li, Wenxin
    Li, Zhao
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S8899 - S8917
  • [23] Management of access privileges for dynamic access control
    Nafei Zhu
    Fangbo Cai
    Jingsha He
    Yixuan Zhang
    Wenxin Li
    Zhao Li
    Cluster Computing, 2019, 22 : 8899 - 8917
  • [24] A Dynamic Privacy Aware Access Control Model for Location Based Services
    Karimi, Leila
    Palanisamy, Balaji
    Joshi, James
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (IEEE CIC), 2016, : 554 - 557
  • [25] A Dynamic Multi-domain Access Control Model in Cloud Computing
    Xiong, Dapeng
    Zou, Peng
    Cai, Jun
    He, Jun
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 3 - 12
  • [26] Design of Dynamic Access Control Model for Power Market Operating System
    Wang, Baoyi
    Liu, Yuanhui
    Zhang, Shaomin
    2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL II, PROCEEDINGS, 2008, : 698 - 702
  • [27] A conditional purpose-based access control model with dynamic roles
    Kabir, Md. Enamul
    Wang, Hua
    Bertino, Elisa
    EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (03) : 1482 - 1489
  • [28] A Provenance-based Access Control Model for Dynamic Separation of Duties
    Dang Nguyen
    Park, Jaehong
    Sandhu, Ravi
    2013 ELEVENTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2013, : 247 - 256
  • [29] Dynamic distributed trust model to control access to resources over the Internet
    Lei, H
    Shoja, GC
    2003 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS, AND SIGNAL PROCESSING, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2003, : 988 - 991
  • [30] A Dynamic Risk-based Access Control Model for Cloud Computing
    Chen, Aiguo
    Xing, Hanwen
    She, Kun
    Duan, Guiduo
    PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCES ON BIG DATA AND CLOUD COMPUTING (BDCLOUD 2016) SOCIAL COMPUTING AND NETWORKING (SOCIALCOM 2016) SUSTAINABLE COMPUTING AND COMMUNICATIONS (SUSTAINCOM 2016) (BDCLOUD-SOCIALCOM-SUSTAINCOM 2016), 2016, : 579 - 584