• 제목/요약/키워드: RBAC(Role-Based Access Control)

검색결과 142건 처리시간 0.032초

A Formal Specification of Role Graph Model Increasing Integrity (무결성이 강화된 역할 그래프 모델의 정형적 명세)

  • Choi EunBok;Lee HyeongOk
    • Journal of Korea Multimedia Society
    • /
    • 제7권11호
    • /
    • pp.1620-1629
    • /
    • 2004
  • The objectives of access control are to protect computing and communication resources from illegal use, alteration, disclosure and destruction by unauthorized users. Although Biba security model is well suited for protecting the integrity of information, it is considered too restrictive to be an access control model for commercial environments. And, Role-Based Access Control(RBAC) model, a flexible and policy-neutral security model that is being widely accepted in commercial areas, has a possibility for compromising integrity of information. In this paper, We present the role graph model which enhanced flexibility and integrity to management of many access permission. Also, In order to represent those rule and constraints clearly, formal descriptions of role assignment rule and constraints in Z language are also given.

  • PDF

Security Policy Management using Role-Based Access Control in CORBA Environment (CORBA 환경에서 역할-기반 접근제어 기법을 이용한 보안정책 관리)

  • 조은정;이금석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 한국정보과학회 1998년도 가을 학술발표논문집 Vol.25 No.2 (3)
    • /
    • pp.175-177
    • /
    • 1998
  • 분산 컴퓨팅 환경에서 응용 프로그램들은 다른 응용 프로그램들과 자원을 공유하고 통신하면서 보다 효율적으로 작업을 수행하게 된다. 이러한 과정에서 침입자들에 의한 자원 손실을 막고 정보 무결성을 유지하는 것은 중요한 문제가 된다. 따라서 분산 환경에서는 분산된 자원 사용에 대한 인증(Authentication) 및 인가(Authorization)과정 등의 중요성이 증대되었다. 이질적인 시스템간의 분산 환경을 구축할 수 있는 미들웨어(Middleware)중 가장 활발히 연구되고 이는 CORBA 에서는 보안 서비스를 제공해 주기 위해 COSS (Common Object Service Specification)3에서 보안 서비스를 정의했다. 하지만 COSS3에서 정의한 객체 접근제어 기법만으로는 효율적인 보안 정책 관리가 어렵다. 따라서 본 논문에서는 CORBA 보안 서비스 중 객체 접근제어를 위해 역할-기반 접근제어 (RBAC : Role - Based Access Control)기법을 이용한 효율적이고 융통성 있는 보안정책 관리에 대해 논한다.

  • PDF

Implementation Strategy of Arithmetic Operations for Privacy-aware Role based Access Control (프라이버시-인지 역할기반 접근 제어의 산술연산 구현 전략)

  • Na, Hyun-Hea;Lee, Ji-Youn;Lee, Ha-Young;Kim, Yoon-Jeong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 한국정보과학회 2011년도 한국컴퓨터종합학술대회논문집 Vol.38 No.1(D)
    • /
    • pp.111-114
    • /
    • 2011
  • PRBAC모델은 RBAC(Role Based Access Control) 모델에 조건(condition), 목적(purpose), 의무(obligation)개념을 포함시킴으로써 프라이버시를 강화한 모델이다. 그러나 조건 표현 내에 산술연산 기능을 지원하지 못한다고 알려져 있다. 본 논문에서는, 프라이버시를 보호하는 쇼핑몰 홈페이지를 구현하는 것을 목표로, 이 중 PRBAC모델을 XML로 구현하고 이를 Java와 연동함으로써 산술연산 기능을 지원하는 방안과, 홈페이지 코드와 데이터베이스를 연결하는 부분에 대한 연구결과를 소개한다.

The Study and Analysis of Role-Based Access Control Model for Protecting the Information (의료 정보 보호를 위한 역할기반 접근제어 분석 및 고찰)

  • Jeon, Gyeong-Hwan;Park, Seok-Cheon;Kim, Sung-Gyu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2015년도 춘계학술발표대회
    • /
    • pp.494-496
    • /
    • 2015
  • 개인의 의료 정보는 개인의 프라이버시에 관련되므로 민감하게 취급되어야 하는 정보이다. 이러한 개인정보 유출은 유출된 정보의 해당 당사자의 사회적 고립과 정보의 질에 따라 당사자의 생명도 위협하게 되므로 철저한 판리가 필요하다. 따라서 의사, 간호사, 환자, 일반인 등의 사용자 식별을 통해 병원 기록의 접근 통제 및 사용 권한에 따른 정보의 암호화 수준과 해당 정보에 특화된 역할기반 접근제어(Role-Based Access Control)를 제정해야 한다. 환자 자신이 자신의 의료정보를 특정한 사람에게 접근 권한을 주어 확인할 수도 있게 하고 그 외의 다른 부분들도 제어 할 수 있게 권한을 부여 할 수 있어야 한다. 본 논문은 현재 의료 및 진찰 정보 관리를 위해 RBAC모델을 기반으로 의료정보보호를 위한 접근제어 방법을 분석하고 각 정보의 객체들과 사용자 간의 효율적인 역할 분담과 한계를 통해 의료 정보의 보호방안을 고찰한다.

Context-Aware Role-based Access Control in an Ubiquitous Environment (유비쿼터스 환경에서 상황 인지 역할 기반 접근 제어)

  • Hyun, Wooseok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2009년도 추계학술발표대회
    • /
    • pp.205-206
    • /
    • 2009
  • 본 논문에서는 유비쿼터스 환경에서 상황 인지 역할 기반 접근 제어(CA-RBAC: Context-Aware Role-based Access Control) 모델을 제안한다. 이 모델의 설계는 이러한 응용에서 상황 기반 접근 제어 요구사항에 의해 안내된다. 이러한 요구사항은 역할에서 사용자의 멤버쉽(memership), 역할 멤버에 의한 수행을 허용하는 것과 하나의 응용 환경에서 상황 기반 서비스 통합과 관련된다. 상황 정보는 역할 멤버에 의한 수행을 허용하는 것과 관련된 정책과 역할 멤버에 의해 역동적으로 인터페이스되는 서비스의 접근과 관련된 정책인, 역할 허용 정책에서 사용되어진다. 상황 정보의 역동적인 속성은 어떤 상황 조건이 유지되는데 실패했을 때, 허용 활동과 역할 멤버쉽의 해제를 위한 모델 수준의 지원을 요구한다. 이러한 모델을 근거로 하여 본 논문에서는 상황 인지 응용을 구축하기 위한 프로그래밍 프레임워크를 표현하고 상황 기반 접근 제어 요구 사항을 명시하고 강화하는 메커니즘(mechanism)을 제공한다.

A Blockchain-based User-centric Role Based Access Control Mechanism (블록체인 기반의 사용자 중심 역할기반 접근제어 기법 연구)

  • Lee, YongJoo;Woo, SungHee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제26권7호
    • /
    • pp.1060-1070
    • /
    • 2022
  • With the development of information technology, the size of the system has become larger and diversified, and the existing role-based access control has faced limitations. Blockchain technology is being used in various fields by presenting new solutions to existing security vulnerabilities. This paper suggests efficient role-based access control in a blockchain where the required gas and processing time vary depending on the access frequency and capacity of the storage. The proposed method redefines the role of reusable units, introduces a hierarchical structure that can efficiently reflect dynamic states to enhance efficiency and scalability, and includes user-centered authentication functions to enable cryptocurrency linkage. The proposed model was theoretically verified using Markov chain, implemented in Ethereum private network, and compared experiments on representative functions were conducted to verify the time and gas efficiency required for user addition and transaction registration. Based on this in the future, structural expansion and experiments are required in consideration of exception situations.

An Object-Oriented Analysis and Design Methodology for Secure Database Design -focused on Role Based Access Control- (안전한 데이터베이스 설계를 위한 객체지향 분석·설계 방법론 -역할기반 접근제어를 중심으로-)

  • Joo, Kyung-Soo;Woo, Jung-Woong
    • Journal of the Korea Society of Computer and Information
    • /
    • 제18권6호
    • /
    • pp.63-70
    • /
    • 2013
  • In accordance with the advancement of IT, application systems with various and complex functions are being required. Such application systems are typically built based on database in order to manage data efficiently. But most object-oriented analysis design methodologies for developing web application systems have not been providing interconnections with the database. Since the requirements regarding the security issues increased, the importance of security has become emphasized. However, since the security is usually considered at the last step of development, it is difficult to apply the security during the whole process of system development, from the requirement analysis to implementation. Therefore, this paper suggests an object-oriented analysis and design methodology for secure database design from the requirement analysis to implementation. This object-oriented analysis and design methodology for secure database design offers correlations with database that most existing object-oriented analysis and design methodologies could not provide. It also uses UMLsec, the modeling language, to apply security into database design. In addition, in order to implement security, RBAC (Role Based Access Control) of relational database is used.

Database Security System supporting Access Control for Various Sizes of Data Groups (다양한 크기의 데이터 그룹에 대한 접근 제어를 지원하는 데이터베이스 보안 시스템)

  • Jeong, Min-A;Kim, Jung-Ja;Won, Yong-Gwan;Bae, Suk-Chan
    • The KIPS Transactions:PartD
    • /
    • 제10D권7호
    • /
    • pp.1149-1154
    • /
    • 2003
  • Due to various requirements for the user access control to large databases in the hospitals and the banks, database security has been emphasized. There are many security models for database systems using wide variety of policy-based access control methods. However, they are not functionally enough to meet the requirements for the complicated and various types of access control. In this paper, we propose a database security system that can individually control user access to data groups of various sites and is suitable for the situation where the user's access privilege to arbitrary data is changed frequently. Data group(s) in different sixes d is defined by the table name(s), attribute(s) and/or record key(s), and the access privilege is defined by security levels, roles and polices. The proposed system operates in two phases. The first phase is composed of a modified MAC (Mandatory Access Control) model and RBAC (Role-Based Access Control) model. A user can access any data that has lower or equal security levels, and that is accessible by the roles to which the user is assigned. All types of access mode are controlled in this phase. In the second phase, a modified DAC(Discretionary Access Control) model is applied to re-control the 'read' mode by filtering out the non-accessible data from the result obtained at the first phase. For this purpose, we also defined the user group s that can be characterized by security levels, roles or any partition of users. The policies represented in the form of Block(s, d, r) were also defined and used to control access to any data or data group(s) that is not permitted in 'read ' mode. With this proposed security system, more complicated 'read' access to various data sizes for individual users can be flexibly controlled, while other access mode can be controlled as usual. An implementation example for a database system that manages specimen and clinical information is presented.

RBAC-based health care service platform for individual recommended health information service (RBAC에 기반한 개인 맞춤형 건강 정보 제공 헬스케어 서비스 플랫폼)

  • Song, Je-Min;Kim, Myung-Sic;Jeong, Kyeong-Ja;Shin, Moon-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • 제15권3호
    • /
    • pp.1740-1748
    • /
    • 2014
  • In this paper, we propose an RBAC based personalized health care service platform in order to provide smart management of personal health record using smart devices. It helps to guide healthful service and provide useful information according to one's individual health record. Personalized health care services platform supports a healthy lifestyle by measuring personal health information in a hospital clinical, imaging, and drug data, as well as that can be obtained from smart devices. Everyone can enter his health related data in everyday life such as food, sleeping time, mood, movement and exercise so that one can manage his personal health information of modern smart features. In addition, if necessary, personal health information can be provided to the hospital information system and staff with the consent of the individual. It can be contributed to simplify the complex process for remote medical. The proposed platform, which applies role based access control model to protect security and privacy, supports a smart health care services for users by providing personalized health care services through the smart applications.

Establishment of a secure networking between Secure OSs

  • Lim, Jae-Deok;Yu, Joon-Suk;Kim, Jeong-Nyeo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.2097-2100
    • /
    • 2003
  • Many studies have been done on secure operating system using secure kernel that has various access control policies for system security. Secure kernel can protect user or system data from unauthorized and/or illegal accesses by applying various access control policies like DAC(Discretionary Access Control), MAC(Mandatory Access Control), RBAC(Role Based Access Control), and so on. But, even if secure operating system is running under various access control policies, network traffic among these secure operating systems can be captured and exposed easily by network monitoring tools like packet sniffer if there is no protection policy for network traffic among secure operating systems. For this reason, protection for data within network traffic is as important as protection for data within local system. In this paper, we propose a secure operating system trusted channel, SOSTC, as a prototype of a simple secure network protocol that can protect network traffic among secure operating systems and can transfer security information of the subject. It is significant that SOSTC can be used to extend a security range of secure operating system to the network environment.

  • PDF