An Administration Iteration Problem and its Solution when Deploying the RBAC Model

Article Preview

Abstract:

Access control is an important infrastructure of an information system. Role-Based Access Control (RBAC) model is the main-stream access control model. When deploying a RBAC model, there is an administration iteration problem which needs the information engineers to define the administrator structure before running the RBAC model, which make the deploying process redundancy and complex, make the running process rigid, and result in decrease of control capability of RBAC model. We present a top-down method. In this method, we define the administration authority as the source of management authority and set up the right and liability mechanism of RBAC. By this method, the administrator structure will be defined and expanded by administrators according to application requirements, and the right and liability mechanism can make sure these administrators should perform their management authorities responsibly and legally. Our method can solve the administration iteration problem and improve the flexibility of RBAC model.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1584-1587

Citation:

Online since:

December 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Sandhu R., Bhamidipati V. (2008). The ASCAA Principles for Next-Generation Role-Based Access Control. In: Proceedings of 3rd International Conference on Availability, Reliability and Security. Barcelona, Spain

Google Scholar

[2] Sandhu R., Bhamidipati.R, Munawer.R.(1999). The ARBAC97 Model for Role-Based Administration of Roles. ACM Transactions on Information and System Security,2(1): 105-135.

DOI: 10.1145/300830.300839

Google Scholar

[3] Hu J.W., Li R.X. Lu Z.D. (2009).On Role Mappings for RBAC-based Secure Interoperation.In: Proceeding of 2009 Third International Conference on Network and System Security, Wuhan, China.

DOI: 10.1109/nss.2009.76

Google Scholar

[4] Jiang Y. Liu W.J. Jin T.G.(2008) . A Trust Evaluation algorithm for Secure Information Sharing in Collaborative Environment. In: Proceeding of 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application

DOI: 10.1109/paciia.2008.204

Google Scholar

[5] Chen T.Y., Chen Y.M., Chu H.C. et al. (2008). Distributed access control architecture and model for supporting collaboration and concurrency in dynamic virtual enterprises. International Journal of Computer Integrated Manufacturing, 21(3): 301-324

DOI: 10.1080/09511920701196950

Google Scholar

[6] Cholvy L., Cuppens F. (1997). Analyzing consistency of security policies. In: Proceedings of 1997 IEEE Symposium on Security and Privacy, Oakland, USA.

DOI: 10.1109/secpri.1997.601324

Google Scholar

[7] Joshi J.B.D., Bhatti R., Bertino E, et al.(2004). Access Control Language for Multidomain Environments. IEEE Internet Computing. 8(6):40-50

DOI: 10.1109/mic.2004.53

Google Scholar

[8] Shafiq B., Joshi J.B.D., Bertino E.et al.(2005). Secure Interoperation in a Multi-Domain Environment Employing RBAC Policies. IEEE Transactions on Knowledge and Data Engineering. 17(11):1557-1577

DOI: 10.1109/tkde.2005.185

Google Scholar

[9] Sun YQ, Gong B., Meng X.X., et al. (2009).Specification and enforcement of flexible security policy for active cooperation.Information Sciences, 179 (15): 2629-2642

DOI: 10.1016/j.ins.2009.01.040

Google Scholar