The Model of Conflict Detection between Permission Assignment Constraints in Role-Based Access Control

RBAC 에서 권한 할당 제약사항들 간의 충돌 탐지 모델

  • 임현수 (고려대학교 컴퓨터학과) ;
  • 조은애 (고려대학교 컴퓨터학과) ;
  • 문창주 (건국대학교 컴퓨터응용과학부)
  • Published : 2005.11.01

Abstract

Assuring integrity of permission assignment (PA) constraints is a difficult task in role-based access control (RBAC) because of the large number of constraints, users, roles and permissions in a large enterprise environment. We provide solutions for this problem using the conflict concept. This paper introduces the conflict model in order to understand the conflicts easily and to detect conflicts effectively. The conflict model is classified as a permission-permission model and a role-permission model. This paper defines two type conflicts using the conflict model. The first type is an inter-PA-constraints (IPAC) conflict that takes place between PA constraints. The other type is a PA-PAC conflict that takes place between a PA and a PA constraint (PAC) Also, the conditions of conflict occurrence are formally specified and proved. We can assure integrity on permission assignment by checking conflicts before PA and PA constraints are applied.

Keywords