Hybrid role hierarchy for the extended role based access control model.
ABSTRACT Role based access control (RBAC) has emerged as a leading access control model to other traditional access control models. However, the traditional RBAC models can not capture fine-grained authorization with mono-type inheritance. In this paper, we discuss the hybrid inheritance based on our extended RBAC model, which is very desirable for capturing the fine-grained access control permissions. When the hybrid inheritances coexist in a role hierarchy, inferring such indirect relations between a pair of roles can became very complex. In particular, we study how the new inheritance relations between roles that are indirectly related can be easily derived through the inference rules, which provides a basis for formally analyzing the hybrid inheritances.
Conference Paper: Web Application Security Gateway with Java Non-blocking IO.[Show abstract] [Hide abstract]
ABSTRACT: We present the design and implementation of the WebDaemon Security Gateway (WDSG) with the techniques of event-driving, non-blocking IO multiplexing, secure cookies, SSL and caches based on PKI framework and role-based access control (RBAC) policy. It not only supports massive concurrency and avoids the pitfalls of traditional block I/O based design, but also is able to secure all the resources of an enterprise and reduce the cost and complexity of administration.Next Generation Information Technologies and Systems, 6th International Workshop, NGITS 2006, Kibbutz Shefayim, Israel, July 4-6, 2006, Proceedings; 01/2006
Article: Role-Based Access Control Models[Show abstract] [Hide abstract]
ABSTRACT: This article introduces a family of reference models for rolebased access control (RBAC) in which permissions are associated with roles, and users are made members of appropriate roles. This greatly simplifies management of permissions. Roles are closely related to the concept of user groups in access control. However, a role brings together a set of users on one side and a set of permissions on the other, whereas user groups are typically defined as a set of users only. The basic concepts of RBAC originated with early multi-user computer systems. The resurgence of interest in RBAC has been driven by the need for general-purpose customizable facilities for RBAC and the need to manage the administration of RBAC itself. As a consequence RBAC facilities range from simple to complex. This article describes a novel framework of reference models to systematically address the diverse components of RBAC, and their interactions.05/1999;
Conference Paper: A Flexible Applicable RBAC Model and Its Administration[Show abstract] [Hide abstract]
ABSTRACT: With the increasing number of users and applications, enterprises or organizations need to effectively protect their important information and easily administrate the security policy. In this paper we analyze the existing access control models and propose an improved role-based access control model and its administration with practical experience to handle with the user privilege assignment relation flexibly.Database and Expert Systems Applications, 2007. DEXA '07. 18th International Workshop on; 10/2007