A new access control model is proposed. It is obtained by the additionof entity hierarchy and attributes to a RBAC model. The attributes in it are used forspecification of the allowed access rights of subjects to entities in a semilattice based accesscontrol system.
Download file
Counter downloads: 84
- Title Hierarchical role-based access control development
- Headline Hierarchical role-based access control development
- Publesher
Tomsk State University
- Issue Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics 3(17)
- Date:
- DOI
Keywords
hierarchy of entities, RBAC model, role-based access control, security models, иерархия сущностей, модель RBAC, ролевое управление доступом, модели безопасностиAuthors
References
Девянин П. Н. Формирование словаря терминов теории моделирования безопасности управления доступом и информационными потоками в компьютерных системах / / Прикладная дискретная математика. 2011. №2. С. 17-39.
Thomas R. K. Team-based Access Control (TMAC): A Primitive for Applying Role-based Access Controls in Collaborative Environments / / Proc. Second ACM Workshop on Rolebased Access Control (RBAC'97), Fairfax, Virginia, USA, November 1997. P. 13-19.
BertionE., Catania B., and Damiani M.L. GEO-RBAC: A Spatially Aware RBAC / / Proc. 10th ACM Symposium on Access Control Models and Technologies (SACMAT'05), Stockholm, Sweeden, June 2005. P. 29-37.
Joshi J., Bertino E. A, LatifU., and Ghafoor A. A Generalized Temporal Role-Based Access Control Model / / IEEE Trans. Knowledge and Data Engineering. 2005. No. 17(1). P. 4-23.
Sandhu R. S. and Al-Kahtani MA. A Model for Attribute-Based User-Role Assignment / / Proc. 18th Annual Computer Security Applications Conference (ACSAC'02), Las Vegas, December 09-13, 2002. P. 353.
Kuhn D. R., Coyne E. J., and Weil T. R. Adding attributes to role-based access control / / IEEE Computer. 2010. No. 43(6). P. 79-81.
Девянин П. Н. Модели безопасности компьютерных систем. Управление доступом и информационными потоками. Учеб. пособие для вузов. М.: Горячая линия-Телеком, 2011. 320 с.
Sandhu R. S., Coyne E. J., Feinstein H. L., and Youman C. E. Role-Based Access Control Models / / IEEE Computer. 1996. No. 29(2). P. 38-47.
Ferraiolo D. F. and Kuhn D. R. Role Based Access Controls / / Proc. 15th National Computer Security Conference, Baltimore, October 1992. P. 554-563.
National Institute of Standards and Technology. Role Based Access Control (RBAC) and Role Based Security [Электронный ресурс]. Режим доступа: http://csrc.nist.gov/groups/ SNS/rbac.

Hierarchical role-based access control development | Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics. 2012. № 3(17).
Download full-text version
Download fileCounter downloads: 248