A Time Constraints Permission Based Delegation Model in RBAC
نویسندگان
چکیده
منابع مشابه
Towards Session-Aware RBAC Delegation: Function Switch
This paper shows how to extend RBAC sessions with dynamic aspects to deal with user switch. Users can authenticate using their functions which will create a dynamic session and automatically activate a set of privileges associated with this function. A dynamic session can be joined, leaved, restarted and reused by authorized users. Moreover, a user can switch the session to another user in orde...
متن کاملRole Slices: A Notation for RBAC Permission Assignment and Enforcement
During the past decade, there has been an explosion in the complexity of software applications, with an increasing emphasis on software design via model-driven architectures, patterns, and models such as the unified modeling language (UML). Despite this, the integration of security concerns throughout the product life cycle has lagged, resulting in software infrastructures that are untrustworth...
متن کاملPermission Re-Delegation: Attacks and Defenses
Modern browsers and smartphone operating systems treat applications as mutually untrusting, potentially malicious principals. Applications are (1) isolated except for explicit IPC or inter-application communication channels and (2) unprivileged by default, requiring user permission for additional privileges. Although inter-application communication supports useful collaboration, it also introdu...
متن کاملA Survey of Delegation from an RBAC Perspective
Delegation in access control takes place in the presence of an access control model, when a user is unable to perform their administratively assigned permissions. In this paper, we discuss the meanings of the word “delegation” found in the literature, focusing on its use in access control. In the context of a rolebased access control model, we survey many possible ways in which delegation can b...
متن کاملDW-RBAC: A formal security model of delegation and revocation in workflow systems
One reason workflow systems have been criticized as being inflexible is that they lack support for delegation. This paper shows how delegation can be introduced in a workflow system by extending the role-based access control (RBAC) model. The current RBAC model is a security mechanism to implement access control in organizations by allowing users to be assigned to roles and privileges to be ass...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Society of Computer and Information
سال: 2010
ISSN: 1598-849X
DOI: 10.9708/jksci.2010.15.11.163