CRBAC: Imposing multi-grained constraints on the RBAC model in the multi-application environment

نویسندگان

  • Deqing Zou
  • Ligang He
  • Hai Jin
  • Xueguang Chen
چکیده

(ABAC) mechanisms are gaining in popularity while the role-based access control (RBAC) mechanism is widely accepted as a general mechanism for authorization management. This paper proposes a new access control model, CRBAC, which aims to combine the advantages of RBAC and ABAC, and integrates all kinds of constraints into the RBAC model. Unlike other work in this area, which only incorporates one or a few particular attribute constraints into RBAC, this paper analyses and abstracts the generic properties of the attribute constraints imposed on authorization systems. Based on these analyses and generalization, two constraints templates are presented, called authorization mapping constraint template and behaviour constraint template. The former template is able to automate the user-role and role-permission mapping, while the latter is used to restrict the behaviours of the authorization entities. The attribute constraints are classified into these two templates. Moreover, the state mechanism is introduced to build up the constraints among the statuses of the entities, and reflect the outcomes of the authorization control as well. Based on the presented templates and the state mechanism, the execution model is developed. A use case is proposed to show the authorization process of our proposedmodel. The extensive analyses are conducted to show its multi-grained constraints by comparing with other models. & 2008 Elsevier Ltd. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

X - Rbac : an Access Control Language for Multi - Domain Environments

A multi-domain application environment consists of distributed multiple organizations, each employing its own security policy, allowing highly intensive inter-domain accesses. Ensuring security in such an environment poses several challenges. XML technologies are being perceived as the most promising approach for developing pragmatic security solutions for such environments because of the integ...

متن کامل

Semantic-aware multi-tenancy authorization system for cloud architectures

Cloud Computing is an emerging paradigm to offer on demand IT services to customers. The access control to resources located in the cloud is one of the critical aspects to enable business to shift into the cloud. Some recent works provide access control models suitable for the cloud, however there are important shortages that need to be addressed in this field. This work presents a step forward...

متن کامل

Designing a new multi-objective fuzzy stochastic DEA model in a dynamic ‎environment to estimate efficiency of decision making units (Case Study: An Iranian Petroleum Company)

This ‎paper presents a new multi-objective fuzzy stochastic data envelopment analysis model          (MOFS-DEA) under mean chance constraints and common weights to estimate the efficiency of decision making units for future financial periods of them. In the initial MOFS-DEA ‏model, the outputs and inputs are ‎characterized by random triangular fuzzy variables with normal distribution, in which ...

متن کامل

A NEW MULTI-OBJECTIVE OPTIMIZATION APPROACH FOR SUSTAINABLE PROJECT PORTFOLIO SELECTION: A REALWORLD APPLICATION UNDER INTERVAL-VALUED FUZZY ENVIRONMENT

Organizations need to evaluate project proposals and select the ones that are the most effective in reaching the strategic goals by considering sustainability issue. In order to enhance the effectiveness and the efficiency of project oriented organizations, in this paper a new multi-objective decision making (MODM) approach of sustainable project portfolio selection is proposed which applies in...

متن کامل

Optimizing a bi-objective vendor-managed inventory of multi-product EPQ model for a green supply chain with stochastic constraints

In this paper, a bi-objective multi-product single-vendor single-buyer supply chain problem is studied under green vendor-managed inventory (VMI) policy based on the economic production quantity (EPQ) model. To bring the model closer to real-world supply chain, four constraints of model including backordering cost, number of orders, production budget and warehouse space are considered stochasti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Network and Computer Applications

دوره 32  شماره 

صفحات  -

تاریخ انتشار 2009