Volume 31 Issue 03
Mar.  2005
Turn off MathJax
Article Contents
Xue Wei, Huai Jinpeng. Extended role-based access control model[J]. Journal of Beijing University of Aeronautics and Astronautics, 2005, 31(03): 298-302. (in Chinese)
Citation: Xue Wei, Huai Jinpeng. Extended role-based access control model[J]. Journal of Beijing University of Aeronautics and Astronautics, 2005, 31(03): 298-302. (in Chinese)

Extended role-based access control model

  • Received Date: 28 Sep 2003
  • Publish Date: 31 Mar 2005
  • An extended RBAC(role based access control) model, RTBAC (role & task based access control) model was presented. The model introduced the notions of task and task instance into RBAC96 model, formally defined the hierarchies of tasks and task instances, specified the relationships between traditional sessions and task instances as well as the relationships between task instances and permissions. Several assistant functions were defined. The model could be used to depict daily business procedures and related access control policies more naturally, so was more suitable for distributed collaborative applications, especially for workflows and service compositions. Based on this model, a new dynamic separation of duty constraint, namely task-based dynamic separation of duty constraint,was formally defined and compared with traditional dynamic separation of duty constraints using a typical example. The new constraint can specify access control related system runtime context more accurately. It can increase the efficiency of access control at runtime.

     

  • loading
  • [1] Simon R T, Zurko M E. Separation of duty in role-based environments. In:Proceedings of Computer Security Foundations Workshop X. Washington:IEEE Computer Society, 1997.183~194 [2] Gligor V D, Gavrila S I, Ferraiolo D F. On the formal definition of separation-of-duty policies and their composition. In:Proceedings of 1998 Symposium on Research in Security and Privacy. Washington:IEEE Computer Society, 1998.172~185 [3] Crampton J. Specifying and enforcing constraints in role-based access control. In:Proceedings of ACM Symposium on Access Control Models and Technologies. New York:ACM Press, 2003.43~50 [4] Ahn G J, Sandhu R. Role-based authorization constraints specification. ACM Transactions on Information and System Security, 2000,3(4):207~226 [5] Sandhu R, Conyne E J, Lfeinstein H, et al. Role based access control models[J] IEEE Computer, 1996,29(2):38~47 [6] Ferraiolo D F, Sandhu R, Gavrila S, et al. Proposed NIST standard for role-based access control[J] ACM Transactions on Information and System Security, 2001,4(3):224~274 [7] Thomas R K, Sandhu R. Task-based authorization controls (TBAC):models for active and enterprise-oriented authorization management. In:Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI:Status and Prospects. London:Chapman&Hall, 1998.262~275 [8] Thomas R K, Sandhu R. Task-based authorization:a research project in next-generation active security models for workflows. http://lsdis.cs.uga.edu/ activities/NSF-workflow/roshan.html, 1996-4-16/2003-6-20 [9] Thomas R K. Team-based access control (TMAC):a primitive for applying role-based access controls in collaborative environments. In:Proceedings of the Second ACM workshop on Role-based Access Control. New York:ACM Press, 1997.13~19
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(3269) PDF downloads(738) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return