Nimble Adaptation of RBAC to Organizational Changes
نویسنده
چکیده
The authors propose a business-oriented approach to support accurate and dynamic user-role assignments for the Role Based Access Control (RBAC) model. Their model, called Business-Driven Role Based Access Control (BD-RBAC), is composed of three layers. The first layer extends the RBAC model with the concepts of business roles, system roles, credentials, and users’ capabilities. The second layer dynamically assigns users to business and system roles, and filters outdated (abnormal) user-role assignments. The third layer supports exception handling and partial authorization. The novel aspect of the work is the adaptation of RBAC-based access control systems to changes in organizational needs, while reducing the burden of security administration. To this end, the authors have developed (1) a series of algorithms to compute internal and external user-role assignments based on organizational policies, users’ requests and capabilities, (2) and shown that their outputs are permissible, i.e., a legitimate user is authorized to activate the role, complete, i.e., a legitimate user can activate the roles necessary to perform all the requested tasks, and minimal, i.e., a legitimate user does not receive any non-authorized or not-needed privileges. Business Driven User Role Assignment: Nimble Adaptation of RBAC to Organizational Changes
منابع مشابه
Business Driven User Role Assignment: Nimble Adaptation of RBAC to Organizational Changes
The authors propose a business-oriented approach to support accurate and dynamic user-role assignments for the Role Based Access Control (RBAC) model. Their model, called Business-Driven Role Based Access Control (BD-RBAC), is composed of three layers. The first layer extends the RBAC model with the concepts of business roles, system roles, credentials, and users’ capabilities. The second layer...
متن کاملImplementing Advanced RBAC Administration Functionality with USE1
Role-based access control (RBAC) is a powerful means for laying out and developing higher-level organizational policies such as separation of duty, and for simplifying the security management process. One of the important aspects of RBAC is authorization constraints that express such organizational policies. While RBAC has generated a great interest in the security community, organizations stil...
متن کاملI Mproved & E Xtended - Rbac ( Jv - Rbac ) M Odel with X . 509 a Uthentication
Role-based access control models have attracted appreciable research interest in past time due to their providing some flexibility to security management and ability to model organizational structure and their capability to reduce administrative expenses. In this paper, we explains the drawbacks of RBAC96 model in the aspect of the authorization, access rules and fine-grain access controls in t...
متن کاملرابطه بین سبک رهبری تحولی و تعهد به تغییر با میانجیگری عدالت سازمانی در کارکنان دانشگاه علوم پزشکی
Introduction: Today, acceptance and adaptation to environmental change is essential for all organizations and the style of organization's leadership with other factors has been taken into account in organizational change. Thus, this study aimed to study the relationship between transformational leadership style and commitment to change through the mediation of organizational justice in 2015 amo...
متن کاملRule Adaptation in Collaborative Working Environments using RBAC Model
Collaborative Working Environments (CWEs) are getting prominence these days. With the increase in the use of collaboration tools and technologies, a lot of sharing and privacy issues have also emerged. Due to its dynamic nature, a CWE needs to adapt the changes into accordingly. In this paper, we have implemented the Adaptive Dynamic Sharing and Privacy-aware Role Based Access Control (Adaptive...
متن کامل