Managing the Intertwining among Users, Roles, Permissions, and User Relationships in an Information Flow Control Model
نویسنده
چکیده
Information flow control prevents information leakage during the execution of an application. Many information flow control models are available and they offer useful features. In the past years, we identified that managing the intertwining among users, roles, permissions, and user relationships is essential. Since we cannot identify a model that manages the intertwining, we developed a new model to offer the feature. This paper gives definitions to the intertwining and proposes the model.
منابع مشابه
A context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملA proposed model for designing an electronic system for managing patient transfer
Background: Information technology application in health care is increasing. The aim of this study, is to introduce a scientific model for designing an electronic system for managing patient transfer. Materials and Methods: This study is an exploratory qualitative study. At first a review of literature was carried out for identifying clinical, managerial and process indicators necessary for p...
متن کاملResolving Information Flow Conflicts in RBAC Systems
Recently, Role Based Access Control (RBAC) model has taken place as a promising alternative to the conventional access control models, MAC and DAC. RBAC is more general than those traditional models as was shown by Osborn et al. [17], however, mapping a role based system to a valid MAC configuration is not always possible because certain combinations of permissions that are included in a role’s...
متن کاملEnhanced Sharing and Privacy in Collaborative Virtual Teams
Privacy concerns keep users from sharing required information in a collaborative environment. There is a need of privacy preserving methods that can enhance flow of information among collaborating users in dynamic teams without compromising their privacy. We describe a user-defined rolebased sharing control model and architecture that uses hybrid roles and hybrid sharing control policy for the ...
متن کاملCONUGA: Constrained User-Group Assignment
In role-based access control (RBAC), permissions are associated with roles and users are made members of appropriate roles, thereby acquiring the roles’ permissions. The principal motivation behind RBAC is to simplify administration. In this paper, we investigate one aspect of RBAC administration concerning assignment of users to roles. We introduce a constrained user-role assignment model, cal...
متن کامل