• Title/Summary/Keyword: RBAC(Role-Based Access Control)

Search Result 142, Processing Time 0.022 seconds

Role based access control of healthcare information system for Mobile environments (모바일 환경에 적합한 헬스 케어 정보 시스템에서의 역할기반 접근제어)

  • Lee You-Ri;Park Dong-Gue
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.119-132
    • /
    • 2005
  • The health care system revolutionized by the use of information and communication technologies. Computer information processing and electronic communication technologies play an increasingly important role in the area of health care. We propose a new role based access control model for pervasive health care systems, which changed location, time, environment information. Also our model can be solved the occurrence of an reduction authority problem to pervasive health care system at emergency environment. We propose a new role based access control model for pervasive health care systems, which combines role-to-role delegations, negative permission, context concept and dynamic context aware access control. With out approach we aim to preserver the advantages of RBAC and offer groat flexibility and fine-grained access control in pervasive healthcare information systems.

  • PDF

Permission Inheritance Expression with Role Hierarchy of RBAC (역할기반 접근통제에서 역할 계층에 따른 접근권한 상속의 표현)

  • Lee, Sang-Ha;Jo, In-Jun;Cheon, Eun-Hong;Kim, Dong-Gyu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.7
    • /
    • pp.2125-2134
    • /
    • 2000
  • RBAC(Role Based Access Control) has the advantage that reflects the real world because it presents a basic access control model based on user's role in organizations or governments. But in RBAC model, the privileges of the senior roles in these hierarchies are inherited from those of the junior roles, so RBAC model has the privileges problem that he senior are given more privileges than they need. That is, it tends to infringe the Principle of Least Privilege. On the other hand, if we give some excessive constraints on the RBAC model without scrupulous care, it may be meaningless property of role hierarchies. Furthermore, such complicated constraints make it more difficult to mange resources and roles in huge enterprise environments. The purpose of this paper is to solve the problems of role hierarchies such as inefficient role managements and abuse of privileges by using newly presented the backward tag pointer path expression in the inheritance of privileges.

  • PDF

Access Control Model using RBAC in BYOD(Bring Your Own Device) (RBAC(Role Based Access Control)을 이용한 BYOD(Bring Your Own Device) 접근제어 관한 연구)

  • Bae, Yo-Han;Lee, Hee-Jo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.04a
    • /
    • pp.379-382
    • /
    • 2014
  • BYOD 는 다양한 기기에서 상호 운용되고, 상황에 따라 다른 접근권한을 가질 수 있다. BYOD 는 기업의 입장에서는 생산성 향상과 기기에 대한 비용 감소 등의 장점을 가지고 있다. 하지만 보안의 중대한 취약점을 가지고 있고 기업은 개인이 사용하는 각기 다른 기기들에 대해서 통제하기 힘들다는 점과 관리비용은 오히려 상승할 수도 있다는 점 등의 단점들이 부각이 되고 있다. BYOD 에 접근 가능한 권한들을 효율적으로 관리하여 접근권한 관련 설정 오류를 최소화하고, 권한이 없는 사용자의 접근을 차단하기 위한 'BYOD 환경에 적합한 접근 제어 기술'이 요구된다. 따라서 본 논문에서는 BYOD 시장의 급속한 발달과, 스마트 폰 하드웨어,소프트웨어의 발전에 맞춰 RBAC(Role Based Access Control)을 이용한 접근제어 방법을 제안한다. 이는 사용자 특성, 역할 특성, 시스템 특성에 따라 권한 활성화 제약이 가능하며, 권한 위임과 권한 상속 시에 시간, 위치정보, 위기 상황 발생여부에 따라 제약을 할 수 있다.

Dynamic Access Control for Personalized Environment in Ubiquitous Computing

  • Kim, Yuna;Shin, IlShik;Hong, Sung Je;Kim, Jong
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.4
    • /
    • pp.233-241
    • /
    • 2007
  • In an ubiquitous environment, for controlling user access according to environment of users, a number of access control models enforcing dynamic environment of users have been proposed. However, they do not support personalized environments of each user and have a run-time overhead of searching active roles. In this paper, we propose a new model, PE-RBAC, that extends the RBAC architecture by addition of a personalized environment component as a constraint to accommodate dynamic and mobile users. In this model, a dynamic role activation is presented by using a new role-to-environment structure instead of the conventional role hierarchy, which makes it efficient to find the active roles according to a user's personalized environment.

  • PDF

A RBAC-based Access Control Framework in OSGi Service Platform (OSGi 서비스 플랫폼에서 RBAC 기반의 사용자 접근제어 프레임워크)

  • Cho, Eun-Ae;Moon, Chang-Joo;Baik, Doo-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.405-422
    • /
    • 2007
  • Recently, according to the network environment, there are many researches for home network. Nowadays, in home network, the method that access control policy is managed for each home device by using ACL is popular, and EAM (Extranet access management) is applied as a solution. In addition, the research about secure OS is ongoing based on open operating system and the research of user authentication mechanisms for home network using home server is also in progress. However, these researches have some problems as follows; First, the transmission scope of expected access technology in home network is wide, so unauthenticated outside terminal can access the home network. Second, user is inconvenient because user need to set the necessary information for each device. Third, user privacy and convenience are not considered. OSGi provides a service platform for heterogeneous technologies in home network environment. Here, user access control is one of the core parts which should have no problems such as above items, but there are no concrete researches yet. Thus in this paper, we propose an access control policy management framework and access control operation based on RBAC for user access control in home network environment in which OSGi service platform is operated. First, we list the consideration which is not clearly mentioned in OSGi standard, and then we solve these above problems through new framework. In addition, we propose the effective and economical operation method which reduces the policy change frequency for user access control by using RBAC concept though limited resource of home gateway. Besides, in this paper, these proposed policies are defined separately as user-role assignment policy and permission-role assignment policy, and user decide their own policies. In conclusion, we provide the scheme to enhance the user convenience and to solve the privacy problem.

Improved Access Control using Context-Aware Security Service (상황인식 보안 서비스를 이용한 개선된 접근제어)

  • Yang, Seok-Hwan;Chung, Mok-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.1
    • /
    • pp.133-142
    • /
    • 2010
  • As the ubiquitous technology has penetrated into almost every aspect of modern life, the research of the security technology to solve the weakness of security in the ubiquitous environment is received much attention. Because, however, today's security systems are usually based on the fixed rules, many security systems can not handle diverse situations in the ubiquitous environment appropriately. Although many existing researches on context aware security service are based on ACL (Access Control List) or RBAC (Role Based Access Control), they have an overhead in the management of security policy and can not manipulate unexpected situations. Therefore, in this paper, we propose a context-aware security service providing multiple authentications and authorization from a security level which is decided dynamically in a context-aware environment using FCM (Fuzzy C-Means) clustering algorithm and Fuzzy Decision Tree. We show proposed model can solve typical conflict problems of RBAC system due to the fixed rules and improve overhead problem in the security policy management. We expect to apply the proposed model to the various applications using contextual information of the user such as healthcare system, rescue systems, and so on.

Implementation of RBAC for Access Control of SECOS(SoonchunHyang E-Commerce System) (SECOS의 접근제어를 위한 RBAC의 구현)

  • 박동규;황유동;안현수
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.2
    • /
    • pp.9-18
    • /
    • 2002
  • SECOS(SoonChunHyang E-Commerce System) is the e-commerce system which was developed by e-commerce software research center in soonchunhyang univ. The system was composed of payment system, retrieving system and framework being used to combine these systems. The modules in the system was composed of components which was developed by CBSE(Component Based Software Engineering) method. In this paper. we implement the Role Based Access Control(RBAC) component for access control of SECOS. We use Attribute Certificates(ACs) in order to implement RBAC in the distributed retrieving system, and implement Attribute Authorities(AAs) which can provide ACs. The Proposed system is implemented by EIB component based JAVA.

  • PDF

RBAC-Based Security Policy Model for SmartCard System (스마트카드 시스템을 위한 RBAC기반의 보안정책모델)

  • Lee Jungrim;Kwon Gihwon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.11a
    • /
    • pp.331-334
    • /
    • 2004
  • 공통평가기준(CC, Common Criteria)의 고등급 평가를 받으려면 정형화된 보안정책 모델이 필요하다. 보안정책 중 하나인 접근제어 정책은 시스템의 자원과 데이터의 접근을 중재하여 오직 허가된 접근만 가능하도록 한다. 오늘날 임의적 접근제어(DAC, Discretionary Access Control)와 강제적 접근제어(MAC, Mandatory Access Control)의 대안으로 주목받는 역할기반 접근제어(RBAC, Role-Based Access Control)는 기업이나 정부의 다양한 조직체계를 반영하는 데 적합한 접근제어 정책이다. 다양한 기능과 보안성이 강조되는 스마트카드 시스템의 접근제어정책으로 RBAC을 적용하고 그에 관한 그래프형태의 정형화된 SPM을 보인다.

  • PDF

Extended GTRBAC Model for Access Control Enforcement in Enterprise Environments (기업환경의 접근제어를 위한 확장된 GTRBAC 모델)

  • Park Dong-Eue;Hwang Yu-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.2
    • /
    • pp.211-224
    • /
    • 2005
  • With the wide acceptance of the Internet and the Web, volumes of information and related users have increased and companies have become to need security mechanisms to effectively protect important information for business activities and security problems have become increasingly difficult. This paper proposes a improved access control model for access control enforcement in enterprise environments through the integration of the temporal constraint character of the GT-RBAC model and sub-role hierarchies concept. The proposed model, called Extended GT-RBAC(Extended Generalized Temporal Role Based Access Control) Model, supports characteristics of GTRBAC model such as of temporal constraint, various time-constrained cardinality, control now dependency and separation of duty constraints(SoDs). Also it supports unconditional inheritance based on the degree of inheritance and business characteristics by using sub-roles hierarchies in order to allow expressing access control policies at a finer granularity in corporate enterprise environments.

  • PDF

Design of the ERBAC for Role Delegations (역할 위임을 위한 ERBAC 설계)

  • Oh, Sug-Kyun;Kim, Seong-Ryeol
    • The KIPS Transactions:PartD
    • /
    • v.10D no.7
    • /
    • pp.1155-1160
    • /
    • 2003
  • This paper applies RBAC policy for solving on the security problems when it will be operated several business on the distributed environments and designed Extended RBAC (ERBAC) model that it is possible to manage security systems on the distributed environments. The designed ERBAC model is based on RBAC96 model due to Sandu et al and added role delegations. Therefor, the designed ERBAC model have the advantage of the following . it can be processed of business without interrupts and implemented server system without modifying its source code, high migration, easy and simple of secure managing.