An Improved Administration Method on Role-Based Access Control in the Enterprise Environment

نویسندگان

  • Sejong Oh
  • Seog Park
چکیده

Access control is a difficult security issue for enterprise organizations. Role-based access control (RBAC) model is well known and recognized as a good security model for enterprise environment. Though RBAC is a good model, administration of RBAC including building and maintaining access control information remains a difficult problem in large companies. RBAC model itself does not tell the solution. Little research was done on practical ways to find the information that fills RBAC components such as role, role hierarchy, permission-role assignment, user-role assignment, and so on from the real world. In this paper we suggest the possibility of model-based administration of RBAC in an enterprise environment. Model-based administration methods allows security administrator to manage access control by GUI that supports graphical enterprise model. If security administrator creates or changes some of components of graphical enterprise model, then it is translated to RBAC schema information by administration tool. We focus on a practical way of deriving access control information from real world. It is a core of model-based administration. Here we show the derivation method and implementation experiences

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

XML for RBAC Administration in Enterprise Environment

We have proposed an object -oriented RBAC (ORBAC) model to efficiently represent the real world. Though ORBAC is a good model, administration of ORBAC including creating and maintaining an access control security policy still remains a challengeable problem. In this paper, we present a practical method that can be employed in an enterprise environment to manage security policies using eXtensibl...

متن کامل

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

Advanced Features for Enterprise-Wide Role-Based Access Control

The administration of users and access rights in large enterprises is a complex and challenging task. Roles are a powerful concept for simplifying access control, but their implementation is normally restricted to single systems and applications. In this article we define Enterprise Roles capable of spanning all IT systems in an organisation. We show how the Enterprise Role-Based Access Control...

متن کامل

Access Control for Manufacturing Process in Networked Manufacturing Environment

The deficiencies of current access control techniques in solving the problems of manufacturing process access conflict in networked manufacturing environment were analyzed. An information model of manufacturing process was constructed, and a case XML Schema of manufacturing task model was given. Based on the characteristic analysis of the access control for the information model, an improved ac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Inf. Sci. Eng.

دوره 17  شماره 

صفحات  -

تاریخ انتشار 2001