Volume 36 Issue 11
Nov.  2010
Turn off MathJax
Article Contents
Ma Li, Ma Shilong, Sui Yuefeiet al. Representation for RBAC model with description logic DLRBAC[J]. Journal of Beijing University of Aeronautics and Astronautics, 2010, 36(11): 1315-1319. (in Chinese)
Citation: Ma Li, Ma Shilong, Sui Yuefeiet al. Representation for RBAC model with description logic DLRBAC[J]. Journal of Beijing University of Aeronautics and Astronautics, 2010, 36(11): 1315-1319. (in Chinese)

Representation for RBAC model with description logic DLRBAC

More Information
  • Corresponding author: Ma Li
  • Received Date: 12 Oct 2009
  • Publish Date: 30 Nov 2010
  • A new description logic-based representation for role-based accesss control(RBAC) model was proposed. RBAC sets and relations were translated as concepts and roles in the description logic respectively. To express RBAC role default inheritance and constraint conditions, symbols that represented role composition and inclusion were introduced to the basic description logic language, such that some RBAC default inheritance properties, such as role hierarchy(RH) transitivity, user-role assignment(UA) inheritance and permission-role assignment(PA) inheritance, and some RBAC constraints, such as static and dynamic separation of duty relations, can be represented formally. By integrating default inheritance with constraints in one formal system, the new inheritance relations that violate the access control strategy can be limited with the help of description logic reasoning mechanisms.

     

  • loading
  • [1] Finin T,Joshi A,Kagal L,et al.ROWLBAC:representing role based access control in OWL //Proceedings of the 13th ACM Symposium on Access Control Models and Technologies.New York:ACM Press,2008:73-82 [2] Sandhu R,Coyne E,Feinstein H,et al.Role-based access control models[J].IEEE Computer,1996,29(2):38-47 [3] Ferraiolo D,Sandhu R,Gavrila S,et al.Proposed NIST standard for role-based access control[J].ACM Transactions on Information and System Security,2001,4(3):224-274 [4] Park J S,Sandhu R S.Role-based for access control on the Web[J].ACM Transactions on Information and System Security,2001,4(1):37-71 [5] Li Q,Zhang X,Xu M,et al.Towards secure dynamic collaborations with group-based RBAC model[J].Computer & Security,2009,28(5):260-275 [6] Kwon J,Moon C.Visual modeling and formal specification of constraints of RBAC using semantic web technology[J].Knowledge-Based Systems,2007,20(4):350-356 [7] Baader F,Calvanese D,McGuinness D L,et al.The description logic handbook[M].Cambridge:Cambridge University Press,2002 [8] McGuinness D L,van Harmelen F.OWL Web ontology language overview .MIT:W3C Recommendation,2004 .http://www.w3.org/TR/2004/REC-owl-features-20040210/ [9] Zhao C,Heilili N,Liu S,et al.Representation and reasoning on RBAC: a description logic approach //ICTAC2005,LNCS 3722.Berlin:Springer,2005:381-393 [10] Ji G,Tang Y,Jiang Y,et al.A description logic approach to represent and extend RBAC model //1st International Symposium on Pervasive Computing and Applications.Urumqi:IEEE Press,2006:151-156 [11] Yu H,Xie Q,Che H.Description logic based conflict detection methods for RB-RBAC model[J].International Journal of Computer Science and Network Security,2006,6(1A):120-125
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(3308) PDF downloads(1092) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return