A FAMILY OF MODELS FOR RULE-BASED USER-ROLE ASSIGNMENT by

نویسندگان

  • Mohammad Abdullah Al-Kahtani
  • Ravi Sandhu
  • Sushil Jajodia
  • Edgar Sibley
  • Kris Gaj
  • Ravi S. Sandhu
چکیده

A FAMILY OF MODELS FOR RULE-BASED USER-ROLE ASSIGNMENT Mohammad Abdullah Al-Kahtani, Ph.D. George Mason University, 2003 Dissertation Director: Dr. Ravi Sandhu Conventional role based access control (RBAC) was designed with closed-enterprise environment in mind where a security officer(s) manually assigns users to roles. However, today, an increasing number of service-providing enterprises make their services available to users via the Internet. Furthermore, many enterprises have users (i.e. workers and/or clients) whose numbers can be in the hundreds of thousands or millions. In addition, RBAC is being supported by software products designed to serve large number of clients such as popular commercial database management systems. All these factors render the manual user-to-role assignment a formidable task which is costly and error-prone. An appealing solution is to automate the assignment process. Besides eliminating the drawbacks of its manual counterpart, automatic assignment, particularly in the case of external user (i.e. clients), extends enterprise-consumers business partnership. In fact some large enterprises have already implemented systems that assign and revoke users automatically, and many of them have achieved 90-95% automation of administration. Our work lays the theoretical foundation for the implementation of the assignment process. It also serves as a benchmark for software implementations. In this dissertation, we describe a family of models called RB-RBAC that extends and modifies RBAC96, a well-known RBAC model, to allow the specification of automatic (implicit) user-role assignment. Model A allows specifying a set of authorization rules that can be used to assign users to roles based on users’ attributes. Model B extends Model A to allow specifying negative authorization and mutual exclusion among roles. Model C extends Model A to allow constraints specification. To show the power and usefulness of RB-RBAC, we demonstrate how it can be configured to express Mandatory Access Controls (MAC) and Discretionary Access Controls (DAC). In addition to RB-RBAC family, we developed an administrative model, ARB-RBAC, which provides the specification needed to administer users’ attributes and authorization rules. Our work demonstrates that it is possible to modify RBAC96 to allow implicit user-role assignment and, at the same time, retain the central features of RBAC96.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Calibration and Application of Logit-Based Stochastic Traffic Assignment Models

There is a growing recognition that discrete choice models are capable of providing a more realistic picture of route choice behavior. In particular, influential factors other than travel time that are found to affect the choice of route trigger the application of random utility models in the route choice literature. This paper focuses on path-based, logit-type stochastic route choice models, i...

متن کامل

Different Network Performance Measures in a Multi-Objective Traffic Assignment Problem

Traffic assignment algorithms are used to determine possible use of paths between origin-destination pairs and predict traffic flow in network links. One of the main deficiencies of ordinary traffic assignment methods is that in most of them one measure (mostly travel time) is usually included in objective function and other effective performance measures in traffic assignment are not considere...

متن کامل

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

A Review of Spatial Factor Modeling Techniques in Recommending Point of Interest Using Location-based Social Network Information

The rapid growth of mobile phone technology and its combination with various technologies like GPS has added location context to social networks and has led to the formation of location-based social networks. In social networking sites, recommender systems are used to recommend points of interest (POIs) to users. Traditional recommender systems, such as film and book recommendations, have a lon...

متن کامل

Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004