CRBAC: Imposing multi-grained constraints on the RBAC model in the multi-application environment
نویسندگان
چکیده
(ABAC) mechanisms are gaining in popularity while the role-based access control (RBAC) mechanism is widely accepted as a general mechanism for authorization management. This paper proposes a new access control model, CRBAC, which aims to combine the advantages of RBAC and ABAC, and integrates all kinds of constraints into the RBAC model. Unlike other work in this area, which only incorporates one or a few particular attribute constraints into RBAC, this paper analyses and abstracts the generic properties of the attribute constraints imposed on authorization systems. Based on these analyses and generalization, two constraints templates are presented, called authorization mapping constraint template and behaviour constraint template. The former template is able to automate the user-role and role-permission mapping, while the latter is used to restrict the behaviours of the authorization entities. The attribute constraints are classified into these two templates. Moreover, the state mechanism is introduced to build up the constraints among the statuses of the entities, and reflect the outcomes of the authorization control as well. Based on the presented templates and the state mechanism, the execution model is developed. A use case is proposed to show the authorization process of our proposedmodel. The extensive analyses are conducted to show its multi-grained constraints by comparing with other models. & 2008 Elsevier Ltd. All rights reserved.
منابع مشابه
X - Rbac : an Access Control Language for Multi - Domain Environments
A multi-domain application environment consists of distributed multiple organizations, each employing its own security policy, allowing highly intensive inter-domain accesses. Ensuring security in such an environment poses several challenges. XML technologies are being perceived as the most promising approach for developing pragmatic security solutions for such environments because of the integ...
متن کاملSemantic-aware multi-tenancy authorization system for cloud architectures
Cloud Computing is an emerging paradigm to offer on demand IT services to customers. The access control to resources located in the cloud is one of the critical aspects to enable business to shift into the cloud. Some recent works provide access control models suitable for the cloud, however there are important shortages that need to be addressed in this field. This work presents a step forward...
متن کاملDesigning a new multi-objective fuzzy stochastic DEA model in a dynamic environment to estimate efficiency of decision making units (Case Study: An Iranian Petroleum Company)
This paper presents a new multi-objective fuzzy stochastic data envelopment analysis model (MOFS-DEA) under mean chance constraints and common weights to estimate the efficiency of decision making units for future financial periods of them. In the initial MOFS-DEA model, the outputs and inputs are characterized by random triangular fuzzy variables with normal distribution, in which ...
متن کاملA NEW MULTI-OBJECTIVE OPTIMIZATION APPROACH FOR SUSTAINABLE PROJECT PORTFOLIO SELECTION: A REALWORLD APPLICATION UNDER INTERVAL-VALUED FUZZY ENVIRONMENT
Organizations need to evaluate project proposals and select the ones that are the most effective in reaching the strategic goals by considering sustainability issue. In order to enhance the effectiveness and the efficiency of project oriented organizations, in this paper a new multi-objective decision making (MODM) approach of sustainable project portfolio selection is proposed which applies in...
متن کاملOptimizing a bi-objective vendor-managed inventory of multi-product EPQ model for a green supply chain with stochastic constraints
In this paper, a bi-objective multi-product single-vendor single-buyer supply chain problem is studied under green vendor-managed inventory (VMI) policy based on the economic production quantity (EPQ) model. To bring the model closer to real-world supply chain, four constraints of model including backordering cost, number of orders, production budget and warehouse space are considered stochasti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Network and Computer Applications
دوره 32 شماره
صفحات -
تاریخ انتشار 2009