A Simple Implementation and Performance Evaluation Extended-Role Based Access Control

نویسنده

  • Wook Shin
چکیده

This paper addresses the complexity issues of extended-role based access control (E-RBAC) implemented under an embedded environment. Although E-RBAC can provide more trusted environment than the traditional trusted operating systems by prohibiting the attacks consisting of ordinary operations, it is expected that its implementation has performance overhead due to the procedural constraints of E-RBAC. An implementation of E-RBAC suggested in this paper reduces the overhead of E-RBAC, and it is also shown that the overhead is not significant compared to that of the previous Intrusion Detection System (IDS) solutions. Key-Words:Extended Role Based Access Control, Secure Embedded Kernel.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

متن کامل

An automatic test case generator for evaluating implementation of access control policies

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

متن کامل

Cardinality Constraint Access Control Model and Implementation

Analysis constraints and its diversity in security access control model. Cardinality is a common constraint in access control model. An extended cardinality constraint access control model is established. According to actual demand, we describe the user-role, user-session, role-session cardinality constraints based on the RBAC model. The differences between static and dynamic cardinality constr...

متن کامل

An Efficient Economic-Statistical Design of Simple Linear Profiles Using a Hybrid Approach of Data Envelopment Analysis, Taguchi Loss Function, and MOPSO

Statistically constrained economic design for profiles usually refers to the selection of some parameters such as the sample size, sampling interval, smoothing constant, and control limit for minimizing the total implementation cost while the designed profiles demonstrate a proper statistical performance. In this paper, the Lorenzen-Vance function is first used to model the implementation...

متن کامل

Context-sensitive access control model for business processes

This paper focuses on problems of access control for business processes. The subject of the paper is a specification of the Contextsensitive access control model for business processes (COBAC). In order to efficiently define and enforce access control for different business processes, the COBAC model is based on the RBAC (Role-based Access Control) model which is extended with the following ent...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005