A Three Tier Architecture for Role-based Access Control

نویسندگان

  • Ravi S. Sandhu
  • Hal Feinstein
  • Ravi Sandhu
چکیده

This paper presents a reference architecture (or conceptual framework) for the speci cation and enforcement of role-based access control (RBAC). The architecture has three tiers in loose analogy to the well-known ANSI/SPARC architecture for database systems. (Although we take our inspiration from the database domain, we emphasize that our proposed RBAC architecture is germane to applications and systems in general and is not limited to databases per se.) The three tiers of the reference architecture consist of (i) multiple external or user views concerned with the utilization of RBAC in a speci c context within the organization, (ii) a single conceptual or community view which amalgamates diverse external views into a consistent and uni ed composite suitable for overall security administration, and (iii) multiple internal or implementation views concerned with enforcement of RBAC in various subsystems of the enterprise information system. This paper discusses these three tiers and their interrelationships. We demonstrate the usefulness of this conceptual approach, and identify issues which need further research to make this framework a reality.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Unified Identity Authentication between Heterogeneous Systems Based on LDAP and RBAC

To solve the problems of unified identity authentication between heterogeneous application systems that emerged in the procedure of informatization construction. The paper presents a 3-tier architecture solution that contains user tier, unified authentication tier and application system tier to realize unified identity authentication between legacy system and new application system. For legacy ...

متن کامل

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

Coordinated session-based admission control with statistical learning for multi-tier internet applications

Popular Internet applications deploy a multi-tier architecture, with each tier provisioning a certain functionality to its preceding tier. In this paper, we address the challenging session-based admission control issue for multi-tier Internet applications. The session-based admission control approach (SBAC) designed for a single Web server is not effective for a multi-tier architecture. This is...

متن کامل

Design of an Integrated Role-Based Access Control Infrastructure for Adaptive Workflow Systems

With increasing numbers of organizations automating their business processes by using workflow systems, security aspects of workflow systems has become a heavily researched area. Also, most workflow processes nowadays need to be adaptive, i.e., constantly changing, to meet changing business conditions. However, little attention has been paid to integrating Security and Adaptive Workflow. In thi...

متن کامل

Mapping Home-network Appliances to Tcp/ip Sockets Using a Three-tiered Home Gateway Architecture

HAS Network Medium I Abstract A three-tier gateway architecture for internetworking between home automation networks and a TCPlIP based wide area network, such as the internet, is described. The architecture abstracts the functionality of any home network into a driver layer (tier one), and provides a common access layer (tier two) from any TCP/IP network application (tier three) to a local hom...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1994