A Semantic and Trust Based Framework for RBAC User-Role Assignment

Article Preview

Abstract:

Semantic; Trust Management; RBAC; User-role Assignment Abstract. The application of RBAC in access management of the enterprise services and resources is very widely. With phenomenal growth of information interaction and cooperation between distributed systems, the number of users can be in the hundreds of thousands or millions. This renders manual user-to-role assignment a formidable task. In this paper, we propose a semantic and trust based framework to automatically assign users to roles based on a finite set of assignment rules defined by authorized people in the enterprise. These rules take into consideration the attributes users own and any constraints set forth by the enterprise including the assignment history and the credit of the requester. We choose OWL to specify the user attributes.

You might also be interested in these eBooks

Info:

Periodical:

Key Engineering Materials (Volumes 439-440)

Pages:

178-182

Citation:

Online since:

June 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Osborn Sylvia, Sandhu Ravi, and Munawer Qamar. Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Transactions on Information and System Security, 85-106(2000), p. vol. 3, no. 2.

DOI: 10.1145/354876.354878

Google Scholar

[2] Mossakowski, T., Drouineaud, M., and Sohr, K. A Temporal-Logic Extension of Role-based Access Control Covering Dynamic Separation of Duties. In Proceedings of the 4th International Conference on Temporal Logic, IEEE Computer Society Press, 83-90(2003).

DOI: 10.1109/time.2003.1214883

Google Scholar

[3] Steinmiiller, B. and Safafik, J. Extending Role-based Access Control Model with States. In Proceedings of the International Conference on Trends in Communications, Bratislava, 398-399(2001), p.

Google Scholar

[4] Crampton, J. and Loizou, G. Administrative Scope and Role Hierarchy Operations. In Proceedings of the seventh ACM symposium on Access control models and technologies, Monterey, California, USA, ACM Press, 145-154(2002), p.

DOI: 10.1145/507711.507736

Google Scholar

[5] Crampton, J. Specifying and Enforcing Constraints in Role-based Access Control. In Proceedings of the eighth ACM symposium on Access control models and technologies, Como, Italy, ACM Press, 43-50(2003), p.

DOI: 10.1145/775412.775419

Google Scholar

[6] Sandhu, R. and Bhamidipati, V. The ASCAA Principles for Next-Generation Role-Based Access Control. ARES 2008 - International Conference on Availability, Reliability and Security, 27-32, (2008), p.

Google Scholar

[7] R. Sandhu, V. Bhamidipati, and Q. Munawer. The ARBAC97 model for role-based administration of roles. ACM Transactions on Information and System Security, 105-135(1999), p. vol. 2, no. 1.

DOI: 10.1145/300830.300839

Google Scholar

[8] S. Oh and R. Sandhu. A model for role administration using organization structure. Proceedings of the seventh ACM symposium on Access control models and technologies, 155-162(2002), p.

DOI: 10.1145/507711.507737

Google Scholar

[9] S. Oh, R. Sandhu, and X. Zhang. An effective role administration model using organization structure. ACM Transactions on Information and System Security (TISSEC), 113-137(2006), p. vol. 9, no. 2.

DOI: 10.1145/1151414.1151415

Google Scholar

[10] M. Al-Kahtani and R. Sandhu. A model for attribute-based user-role assignment. Proceedings of 17th Annu. Computer Security Applications Conf. Las Vegas, NV, 353-362(2002), p.

DOI: 10.1109/csac.2002.1176307

Google Scholar

[11] Yahalom R, Klein B. and Beth T. Trust relationships in secure systems-a distributed authentication perspective. Proc. 1993 IEEE Symp. Research in Security and Privacy. 150-164(1993), p.

DOI: 10.1109/risp.1993.287635

Google Scholar