Context sensitivity in role-based access control

Author:

Kumar Arun1,Karnik Neeran1,Chafle Girish1

Affiliation:

1. Block 1, Indian Institute of Technology, Hauz Khas, New Delhi-110016, India

Abstract

This paper describes an extended role-based access control (RBAC) model, which makes RBAC sensitive to the context of an attempted operation. Traditional RBAC does not specify whether the permissions associated with a role enable access to a particular object, or to some subset of objects belonging to a class. We extend the model by introducing the notions of role context and context filters. Context filters are Boolean expressions based on the context of the user attempting the operation, as well as the context of the object upon which the operation is attempted. By supplying context filters during the definition of a role, a security administrator can easily limit the applicability of users' role memberships to particular subsets of the target objects. We also describe our implementation of the model in a web-services platform, to illustrate how this technique is particularly valuable when the data is hierarchically structured.

Publisher

Association for Computing Machinery (ACM)

Reference14 articles.

1. Supporting relationships in access control using role based access control

2. {BEK+00} Don Box David Ehnebuske Gopal Kakivaya Andrew Layman Noah Mendelsohn Henrik Nielsen Satish Thatte and Dave Winer. Simple Object Access Protocol (SOAP) 1.1. http://www.w3.org/TR/SOAP May 2000. {BEK+00} Don Box David Ehnebuske Gopal Kakivaya Andrew Layman Noah Mendelsohn Henrik Nielsen Satish Thatte and Dave Winer. Simple Object Access Protocol (SOAP) 1.1. http://www.w3.org/TR/SOAP May 2000.

3. Securing context-aware applications using environment roles

4. Semantic file systems

Cited by 34 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Risk-Based Access Control Model: A Systematic Literature Review;Future Internet;2020-06-11

2. Towards Effective Verification of Multi-Model Access Control Properties;Proceedings of the 24th ACM Symposium on Access Control Models and Technologies;2019-05-28

3. Context-Based Security and Privacy for Healthcare IoT;2018 IEEE International Conference on Smart Internet of Things (SmartIoT);2018-08

4. Context-sensitive constraints for access control of business processes;Computer Science and Information Systems;2018

5. Secure logical schema and decomposition algorithm for proactive context dependent attribute based inference control;Data & Knowledge Engineering;2017-09

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3