Fuzzy Approach to Role Based Access Control

ثبت نشده
چکیده

The goal of access control is to allow only authorized users to access sensitive information. Role based access control (RBAC) is emerging as a generalized approach to security and has been shown to be applicable to a wide range of security requirements of organizations and applications [3]. Possibility of using RBAC approach to an environment with multiple policy domains further justifies the tremendous momentum seen in RBAC research in the recent years. However, with the increasing size of the problem domain represented by today’s huge information systems that cross organizational boundaries, the issue of management and complexity of security and providing its assurance poses daunting challenges. A fuzzy approach to addressing the issue of security can provide a pragmatic and promising new direction in this area.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fuzzy Approach to Role Based Access Control

The goal of access control is to allow only authorized users to access sensitive information. Role based access control (RBAC) is emerging as a generalized approach to security and has been shown to be applicable to a wide range of security requirements of organizations and applications [3]. Possibility of using RBAC approach to an environment with multiple policy domains further justifies the ...

متن کامل

Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

متن کامل

Applying Fuzzy Relations in Role-Based Access Control

Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted access permission to all resources assigned to the user that they claim to be. However, numerous studies have shown that most security breaches are done by unauthorized users impersonating as authorized users (e.g. by ...

متن کامل

Asthma Control Level Assessment by Moving from the Current Reactive Care Models into a Preventive Approach based on Fuzzy Clustering and Classification Algorithms

Background and Aim: Asthma is a common and chronic disease of respiratory tracts. The best way to treat Asthma is to control it. Experts of this field suggest the continues monitoring on Asthma symptoms and adjustment of self-care plan with offering the preventive treatment program to have desired control over Asthma. Presenting these plans by the physician is set based on the control level in ...

متن کامل

Fuzzy Role-Based Access Control

RBAC (Role-Based Access Control) is a widely used access control model, which reduces the maintenance cost of classical identitybased access control. However, despite the benefits of RBAC, there are environments in which RBAC can hardly be applied. We present FRBAC (Fuzzy Role-Based Access Control), a generalization of RBAC that fits the requirements of environments where authorization-related ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003