Paper Title:
A Semantic and Trust Based Framework for RBAC User-Role Assignment
  Abstract

Semantic; Trust Management; RBAC; User-role Assignment Abstract. The application of RBAC in access management of the enterprise services and resources is very widely. With phenomenal growth of information interaction and cooperation between distributed systems, the number of users can be in the hundreds of thousands or millions. This renders manual user-to-role assignment a formidable task. In this paper, we propose a semantic and trust based framework to automatically assign users to roles based on a finite set of assignment rules defined by authorized people in the enterprise. These rules take into consideration the attributes users own and any constraints set forth by the enterprise including the assignment history and the credit of the requester. We choose OWL to specify the user attributes.

  Info
Periodical
Key Engineering Materials (Volumes 439-440)
Edited by
Yanwen Wu
Pages
178-182
DOI
10.4028/www.scientific.net/KEM.439-440.178
Citation
X. Y. Chen, M. L. Zhu, "A Semantic and Trust Based Framework for RBAC User-Role Assignment", Key Engineering Materials, Vols. 439-440, pp. 178-182, 2010
Online since
June 2010
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Ye Long Qi, Yu Hong Yang
Chapter 2: Computer Science and Computational Science, Information Processing
Abstract:A rain fading mitigation technique, called Adaptive Coding and Modulation (ACM), is supported by the DVB-S2 standard. But the number of...
411
Authors: Sung Hoon Son
Chapter 8: Software Design and Development
Abstract:In this paper, a virtual machine migration policy for large scale virtual desktop service is proposed. Usually a virtual desktop service is...
1564
Authors: Xiao Hong Liao, Ping Hua Chen
Chapter 2: Advanced Сomputer and Information Technology, Applications Simulation, Measurements and Electronics Engineering
Abstract:Due to the simplicity and high recommending quality, collaborative filtering algorithms are the most successful recommender techniques and...
247
Authors: Bao Yi Wang, Wen Xue Zhang, Shao Min Zhang
Chapter 6: Information Technologies, WEB and Networks Engineering, Information Security, Software Application and Development
Abstract:A combination of Task and Role-based Access Control with multi-constraint is put forward in this paper. It is designed to solve problem of...
2532