Hybrid role hierarchy for the extended role based access control model.
ABSTRACT Role based access control (RBAC) has emerged as a leading access control model to other traditional access control models. However, the traditional RBAC models can not capture fine-grained authorization with mono-type inheritance. In this paper, we discuss the hybrid inheritance based on our extended RBAC model, which is very desirable for capturing the fine-grained access control permissions. When the hybrid inheritances coexist in a role hierarchy, inferring such indirect relations between a pair of roles can became very complex. In particular, we study how the new inheritance relations between roles that are indirectly related can be easily derived through the inference rules, which provides a basis for formally analyzing the hybrid inheritances.
- SourceAvailable from: cs.uiuc.edu
Article: Role-based access control models[Show abstract] [Hide abstract]
ABSTRACT: Security administration of large systems is complex, but it can be simplified by a role-based access control approach. This article explains why RBAC is receiving renewed attention as a method of security administration and review, describes a framework of four reference models developed to better understand RBAC and categorizes different implementations, and discusses the use of RBAC to manage itselfComputer 03/1996; · 1.44 Impact Factor
Conference Paper: A Flexible Applicable RBAC Model and Its Administration[Show abstract] [Hide abstract]
ABSTRACT: With the increasing number of users and applications, enterprises or organizations need to effectively protect their important information and easily administrate the security policy. In this paper we analyze the existing access control models and propose an improved role-based access control model and its administration with practical experience to handle with the user privilege assignment relation flexibly.Database and Expert Systems Applications, 2007. DEXA '07. 18th International Workshop on; 10/2007
Conference Paper: Web Application Security Gateway with Java Non-blocking IO.[Show abstract] [Hide abstract]
ABSTRACT: We present the design and implementation of the WebDaemon Security Gateway (WDSG) with the techniques of event-driving, non-blocking IO multiplexing, secure cookies, SSL and caches based on PKI framework and role-based access control (RBAC) policy. It not only supports massive concurrency and avoids the pitfalls of traditional block I/O based design, but also is able to secure all the resources of an enterprise and reduce the cost and complexity of administration.Next Generation Information Technologies and Systems, 6th International Workshop, NGITS 2006, Kibbutz Shefayim, Israel, July 4-6, 2006, Proceedings; 01/2006