Filters








1,146,151 Hits in 4.9 sec

Administration in role-based access control

Ninghui Li, Ziqing Mao
2007 Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07  
Based on these requirements and the lessons learned in analyzing existing approaches, we design UARBAC, a new family of administrative models for RBAC that has significant advantages over existing models  ...  Administration of large-scale RBAC systems is a challenging open problem. We propose a principled approach in designing and analyzing administrative models for RBAC.  ...  Acknowledgement This work is supported by NSF CNS-0448204 (CAREER: Access Control Policy Verification Through Security Analysis And Insider Threat Assessment), and by sponsors of CERIAS.  ... 
doi:10.1145/1229285.1229305 dblp:conf/ccs/LiM07 fatcat:ka5f4ixo2rb2tci6w5dcnhnccm

Role - based Access Control in Educational Administration System

Liu Dongdong, Xu Shiliang, Zhang Yan, Tan Fuxiao, Niu Lei, Zhao Jia, Bing Xu, Yinong Chen
2017 MATEC Web of Conferences  
In order to improve the system security , the widely-used RBAC control method is introduced in this paper.  ...  to the structure of multi-level applications by controlling the data range accessible to users, and ultimately achieves the purpose of strengthening the security of the system. role contains all the privileges  ...  The security scheme of the educational administration system is based on the role-based access control under the premise of identity authentication, so the system security requirements mainly involve  ... 
doi:10.1051/matecconf/201713900120 fatcat:k5apwminr5exjcjbherpiogeca

Administrative Models for Role Based Access Control in Android

Samir Talegaon, Ram Krishnan
2020 Journal of Internet Services and Information Security  
Prior works propose new models for role based access control (RBAC) in Android; this paper adds on to that body of research.  ...  Despite RBAC's inherent administrative ease, managing roles for Android applications is tedious for the device user, owing to their lack of knowledge in access control.  ...  that can be installed at any time on modern devices, previous work has explored a role based access control (RBAC) in Android [1, 11] .  ... 
doi:10.22667/jisis.2020.08.31.031 dblp:journals/jisis/TalegaonK20 fatcat:ttrv4ml5kbh5xl7ricfe54q6ki

Policy Analysis for Administrative Role Based Access Control without Separate Administration [chapter]

Ping Yang, Mikhail Gofman, Zijiang Yang
2013 Lecture Notes in Computer Science  
In particular, role based access control (RBAC) is a generalized approach to access control and is well recognized for its many advantages in managing authorization policies.  ...  This paper considers user-role reachability analysis of administrative role based access control (ARBAC), which defines administrative roles and specifies how members of each administrative role can change  ...  This work was supported in part by NSF Grant CNS-0855204.  ... 
doi:10.1007/978-3-642-39256-6_4 fatcat:fjj6t3wqejdv7iwad5eb2y7flq

User-Role Reachability Analysis of Evolving Administrative Role Based Access Control [chapter]

Mikhail I. Gofman, Ruiqi Luo, Ping Yang
2010 Lecture Notes in Computer Science  
Administrative Role Based Access Control (ARBAC) specifies permissions for administrators to change RBAC policies.  ...  Role Based Access Control (RBAC) has been widely used for restricting resource access to only authorized users.  ...  Administrative Role Based Access Control'97 (ARBAC97) [15] specifies permissions for administrators to change RBAC policies.  ... 
doi:10.1007/978-3-642-15497-3_28 fatcat:2ow66wzlofh5rahi3yh5snf7la

Security Extensible Access Control Markup Language Policy Integration Based on Role-Based Access Control Model in Healthcare Collaborative Environments

Kuang
2011 American Journal of Economics and Business Administration  
Conclusion: Our work can guarantee the completeness as well as consistency of the access control policy.  ...  Though eXtensible Access Control Markup Language (XACML) has a powerful capacity of expression, it does not support all the elements character of RBAC.  ...  Access control model such as Discretionary Access Control (DAC), Mandatory Access Control, Role-Based Access Control (RBAC) as well as door access control for building security (Wahyudi et al., 2007)  ... 
doi:10.3844/ajebasp.2011.101.111 fatcat:ofnctacytvbj5mbue6j5eytbay

Incremental Analysis of Evolving Administrative Role Based Access Control Policies [chapter]

Silvio Ranise, Anh Truong
2014 Lecture Notes in Computer Science  
We consider the safety problem for Administrative Role-Based Access Control (ARBAC) policies, i.e. detecting whether sequences of administrative actions can result in policies by which a user can acquire  ...  Since problems in such sequences share almost all administrative actions, we propose an incremental technique that avoids the re-computation of the solution to the current problem by re-using much of the  ...  We thank the authors of [8, 9] for making the code of their tool available to us and the help in using it. We also thank the anonymous reviewers for their constructive criticisms.  ... 
doi:10.1007/978-3-662-43936-4_17 fatcat:ozbrhoqqvvhnnevdulzgwoo2be

Policy Analysis for Self-administrated Role-Based Access Control [chapter]

Anna Lisa Ferrara, P. Madhusudan, Gennaro Parlato
2013 Lecture Notes in Computer Science  
Current techniques for security analysis of administrative role-based access control (ARBAC) policies restrict themselves to the separate administration assumption that essentially separates administrative  ...  of users, where the bound depends only on the number of administrative roles in the system.  ...  Introduction Role-based access control (RBAC) has emerged in recent years as a simple and effective access control mechanism for large organizations [6, 17] .  ... 
doi:10.1007/978-3-642-36742-7_30 fatcat:st55i5j5x5c7zdyk6o3nt6mn54

Vac - Verifier of Administrative Role-Based Access Control Policies [chapter]

Anna Lisa Ferrara, P. Madhusudan, Truc L. Nguyen, Gennaro Parlato
2014 Lecture Notes in Computer Science  
In this paper we present Vac, an automatic tool for verifying security properties of administrative Role-based Access Control (RBAC).  ...  RBAC has become an increasingly popular access control model, particularly suitable for large organizations, and it is implemented in several software.  ...  Role-based Access Control (RBAC) has become an increasingly popular access control model [5] , it is standardized by NIST and is implemented in several software, such as Microsoft SQL Servers, Microsoft  ... 
doi:10.1007/978-3-319-08867-9_12 fatcat:qxrz5t2q4jexre5mxrsb3hqwsa

Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization

Haio Roeckle, Gerhard Schimpf, Rupert Weidinger
2000 Proceedings of the fifth ACM workshop on Role-based access control - RBAC '00  
The core of this paper presents the data model, which integrates business processes, role based security administration and access control.  ...  In this paper we describe the work in progress with a processoriented approach for role-finding to implement Role-Based Security Administration.  ...  "SAM" Role Role -Based Administration Role-Based Administration Layer Role-Based User-Administration Business Layer Access Control Layer Physical Access Control Systems Role Catalog  ... 
doi:10.1145/344287.344308 dblp:conf/rbac/RoeckleSW00 fatcat:3jbewfpw3jeodlb6mkqcuvtppa

Context-Aware Role Based Access Control Using User Relationship

Kangsoo Jung, Seog Park
2013 Journal of clean energy technologies  
Role-based access control is widely used in modern enterprise systems because it is adequate for reflecting the functional hierarchy in various organizations' for access control model.  ...  As a result, the administrator can manage fine-grained access control for cooperative work in an organization.  ...  Fig. 4 is our access control model that extend traditional role-based access control model. In proposed technique, role is not directly mapped to permission.  ... 
doi:10.7763/ijcte.2013.v5.744 fatcat:hkieumyevvgnfjlkej2bozfffi

Managing access control policy from end user perspective in collaborative environment

Suzana Ahmad, Siti Zaleha Zainal Abidin, Nasiroh Omar, Stephan Reiff-Marganiec
2014 2014 IEEE Conference on Open Systems (ICOS)  
Normally, data access control policy consists of a resource and authorization descriptions which are assigned by the administrator.  ...  By adapting RBAC model and adding owner's interest on permissions for data operations and objects, the proposed framework will facilitate data access control whereby owners have the freedom to set their  ...  Proposed mechanisms are implemented in adaptation of enhanced Role-based access control (RBAC) models.  ... 
doi:10.1109/icos.2014.7042636 fatcat:wbeszq6a6zetvnul46o2vyo6ii

An administration concept for the enterprise role-based access control model

Axel Kern, Andreas Schaad, Jonathan Moffett
2003 Proceedings of the eighth ACM symposium on Access control models and technologies - SACMAT '03  
Automated identity management, security provisioning, security administration, role-based access control (RBAC), enterprise role-based access control (ERBAC), enterprise roles, administrative role-based  ...  Finally, a critical evaluation and comparison with current approaches to administrative role-based access control is provided.  ...  ) DB2 AN ADMINISTRATION CONCEPT FOR ENTERPRISE ROLES The Enterprise Role-Based Access Control Model (ERBAC) In [5] and [4] we introduced the Enterprise-Role Based Access Control Model (ERBAC) which  ... 
doi:10.1145/775412.775414 dblp:conf/sacmat/KernSM03 fatcat:vwuypc65c5du3mcuqpgpjql4fe

An administration concept for the enterprise role-based access control model

Axel Kern, Andreas Schaad, Jonathan Moffett
2003 Proceedings of the eighth ACM symposium on Access control models and technologies - SACMAT '03  
Automated identity management, security provisioning, security administration, role-based access control (RBAC), enterprise role-based access control (ERBAC), enterprise roles, administrative role-based  ...  Finally, a critical evaluation and comparison with current approaches to administrative role-based access control is provided.  ...  ) DB2 AN ADMINISTRATION CONCEPT FOR ENTERPRISE ROLES The Enterprise Role-Based Access Control Model (ERBAC) In [5] and [4] we introduced the Enterprise-Role Based Access Control Model (ERBAC) which  ... 
doi:10.1145/775413.775414 fatcat:2zptzdz6jnaqreazrhd4e24jdy

A Design of Onto-ACM(Ontology based Access Control Model) in Cloud Computing Environments

Chang Choi, Junho Choi, Byeongkyu Ko, Kunseok Oh, Pankoo Kim
2012 Journal of Internet Services and Information Security  
RBAC(Role-Based Access Control) and C-RBAC(Context-Aware Role Based Access Control) do not suggest effective and practical solution using dynamic access control method by manager and user.  ...  In this paper, we propose Onto-ACM(Ontology Based Access Control Model) for dynamic access control. Onto-ACM is a semantic analysis model for permitted limit of service provider and user.  ...  Control), RBAC(Role-Based Access Control) and ABAC(Attribute-Based Access Control) in cloud computing environment.  ... 
doi:10.22667/jisis.2012.11.31.054 dblp:journals/jisis/ChoiCKOK12 fatcat:sydjt2ta5feubbqcmvxhyfg6ki
« Previous Showing results 1 — 15 out of 1,146,151 results