• 제목/요약/키워드: Role-based Model

Search Result 2,732, Processing Time 0.037 seconds

A Role-Based Delegation Model Using Role Hierarchy with Restricted Permission Inheritance (권한상속제한 역할계층을 이용한 역할기반 위임 모델)

  • 박종순;이영록;이형효;노봉남;조상래
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.129-138
    • /
    • 2003
  • Role-Based Access Control(RBAC) model is becoming a promising model for enterprise environments with various organization structures. In terms of role hierarchy, each senior role inherits all the permissions of its junior roles in the role hierarchy, and a user who is a member of senior role is authorized to carry out the inherited permissions as well as his/her own ones. But there is a possibility for senior role members to abuse permissions. Since senior role members need not have all the authority of junior roles in the real world, enterprise environments require a restricted inheritance rather than a unconditional or blocked inheritance. In this paper, we propose a new role-based delegation model using the role hierarchy model with restricted inheritance functionality, in which security administrator can easily control permission inheritance behavior using sub-roles. Also, we describe how role-based user-to-user, role-to-role delegations are accomplished in the model and the characteristics of the proposed role-based delegation model.

Role-Based Delegation Model Using Available Time (가용 시간을 이용한 역할 기반 위임 모델)

  • Kim, Kyoung-Ja;Chang, Tae-Mu
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.65-72
    • /
    • 2007
  • The existing RBAC models are not sufficient for managing delegations or separation of roles. Researches have been done on RBDM(Role Based Delegation Model) that deal with delegating role or permission to other users. In this paper, we divide the delegated roles into two groups: periodic and temporary delegation roles. When a role is delegated, a time period is assigned together, which is used to revoke the permission of delegated role automatically. In our model, the role of monotonic delegation by an original user can be revoked at any time in case of malicious use by the delegated user. The contribution of our model is that the malicious use of delegated role can be prohibited and security vulnerability in the role hierarchy due to role delegations can be alleviated. The proposed model, T RBDM(Time out Based RBDM) is analyzed and compared with the conventional models, such as RBDM0, RBDM1 and PBDM. Our model shows an advantage over other models in terms of security robustness.

Extended Role-Based Access Control with Context-Based Role Filtering

  • Liu, Gang;Zhang, Runnan;Wan, Bo;Ji, Shaomin;Tian, Yumin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1263-1279
    • /
    • 2020
  • Activating appropriate roles for a session in the role-based access control (RBAC) model has become challenging because of the so-called role explosion. In this paper, factors and issues related to user-driven role management are analysed, and a session role activation (SRA) problem based on reasonable assumptions is proposed to describe the problem of such role management. To solve the SRA problem, we propose an extended RBAC model with context-based role filtering. When a session is created, context conditions are used to filter roles that do not need to be activated for the session. This significantly reduces the candidate roles that need to be reviewed by the user, and aids the user in rapidly activating the appropriate roles. Simulations are carried out, and the results show that the extended RBAC model is effective in filtering the roles that are unnecessary for a session by using predefined context conditions. The extended RBAC model is also implemented in the Apache Shiro framework, and the modifications to Shiro are described in detail.

Design of a System Model for the Role-Based Access Control for Web-Based Applications (웹 기반 응용을 위한 직물 기반 접근 제어 시스템 모델 설계)

  • Lee Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.3
    • /
    • pp.63-69
    • /
    • 2004
  • The purpose of this paper is to design a system model which is needed for integrating the secure role-based access control model into web-based application systems. For this purpose, firstly, the specific system architecture model using a user-pull method is presented. This model can be used as a design paradigm. Secondly, the practical system working model is proposed. which specifies the mechanism that performs role-based access control in the environment of web-based application systems. Finally, the comparison and analysis is shown in which the merits with the proposed system model is presented.

  • PDF

Enhanced Role-Based Access Control Administration Tool

  • Yenmunkong, Burin;Sathitwiriyawong, Chanboon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1360-1364
    • /
    • 2004
  • This paper propose an extended model for role-permission assignment based on locations called "Enhanced Role-Based Access Control (ERBAC03)". The proposed model is built upon the well-known RBAC model. Assigning permissions to role is considered too complex activity to accomplish directly. Instead we advocate breaking down this process into a number of steps. The concept of jobs and tasks is specifically introduced to facilitate role-permission assignment into a series of smaller steps. This model is suitable for any large organization that has many branches. Each branch consists of many users who work in difference roles. An administration tool has been developed to assist administrators with the administration of separation of duty requirements. It demonstrates how the specification of static requirements can be done based on "conflicting entities" paradigm. Static separation of duty requirements must be enforced in the administration environment. Finally, we illustrate how the ERBAC03 prototype is used to administer the separation of duty requirements.

  • PDF

Role-Based Application Model for Supporting Spontaneous Interoperation in Ubiquitous Environments (유비쿼터스 환경에서 자발적 상호연동을 지원하는 역할 기반 응용 모델)

  • Jung, Jong-Yun;Ryu, Ki-Yeol;Lee, Jung-Tae
    • Journal of Information Technology Services
    • /
    • v.11 no.3
    • /
    • pp.269-285
    • /
    • 2012
  • The spontaneous interoperation is an important characteristic of ubiquitous applications and is closely related with mobility. The mobile components in ubiquitous environments are liable to appear in and disappear from one physical space to another. Because this characteristic certainly influences the structure and behavior of applications, they should adapt themselves to the changed environments by configuring their structure and behaviors. Consequently, developers are faced with the above challenging issue when they design and implement ubiquitous applications. The role concept is an efficient tool to model participant entities, their relationship, and collaboration, so role-based model are appropriate to describe a structure and behavior of software system. But, little attention has been given to reflect characteristics of ubiquitous applications. To tackle the problem, this study considers a ubiquitous application as a software organization which consists of software components and proposes an enhanced role-based application model for supporting spontaneous interoperation.

Role Based Access Control Model contains Role Hierarchy (역할계층을 포함하는 역할기반 접근통제 모델)

  • 김학범;김석우
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.49-58
    • /
    • 2002
  • RBAC(Role Based Access Control) is an access control method based on the application concept of role instead of DAC(Discretionary Access Control) or MAC(Mandatory Access Control) based on the abstract basic concept. Model provides more flexibility and applicability on the various computer and network security fields than the limited 1functionality of kernel access control orginated from BLP model. In this paper, we propose $ERBAC_0$ (Extended $RBAC_0$ ) model by considering subject's and object's roles and the role hierarchy result from the roles additionally to $RBAC_0$ base model. The proposed $ERBAC_0$ model assigns hierarchically finer role on the base of subject and object level and provides flexible access control services than traditional $RBAC_0$ model.

  • PDF

Extended GTRBAC Delegation Model for Access Control Enforcement in Enterprise Environments (기업환경의 접근제어를 위한 확장된 GTRBAC 위임 모델)

  • Hwang Yu-Dong;Park Dong-Gue
    • Journal of Internet Computing and Services
    • /
    • v.7 no.1
    • /
    • pp.17-30
    • /
    • 2006
  • With the wide acceptance of the Internet and the Web, volumes of information and related users have increased and companies have become to need security mechanisms to effectively protect important information for business activities and security problems have become increasingly difficult. This paper proposes a improved access control model for access control enforcement in enterprise environments through the integration of the temporal constraint character of the GT-RBAC model. sub-role hierarchies concept and PBDM(Permission Based Delegation Model). The proposed model. called Extended GT-RBAC(Extended Generalized Temporal Role Based Access Control) delegation Model. supports characteristics of GTRBAC model such as of temporal constraint, various time-constrained cardinality, control flow dependency and separation of duty constraints (SoDs). Also it supports conditional inheritance based on the degree of inheritance and business characteristics by using sub-roles hierarchies and supports permission based delegation, user to user delegation, role to role delegation, multi-step delegation and temporal delegation by using PBDM.

  • PDF

An Advanced Permission-Based Delegation Model in RBAC (RBAC을 기반으로 하는 향상된 권한 위임 모델)

  • Kim, Tae-Shik;Chang, Tae-Mu
    • The KIPS Transactions:PartC
    • /
    • v.13C no.6 s.109
    • /
    • pp.725-732
    • /
    • 2006
  • RBAC(Role-Based Access Control) has advantages in managing access controls, because it offers the role inheritance and separation of duty in role hierarchy structures. However, RBAC does not process delegation of permission effectively that occurs frequently in the real world. This paper proposes an Advanced Permission-Based Delegation Model(APBDM) that guarantees permanency of delegated permissions and does not violate security principle of least privilege and separation of duty. APBDM, based on the well-known RBAC96, supports both user-to-user and role-to-role delegation. A delegator can give permission to a specific person, that is delegatee, and the permission can be withdrawn whenever the delegator wants. Our model is analyzed and shown to be effective in the present paper.

A Design of Role-Based Access Control Model (직무기반 접근제어 모델 설계)

  • Lee, Ho;Chung, Jin-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.1
    • /
    • pp.60-66
    • /
    • 2001
  • We designed a role-based access control model that can resolve the complicated tasks of control requirements. The designed access control model can control permissions efficiently use of a role-based access control. It guarantees the confidentiality integrity and availa information making use of identity-based and rule-based access controls. It can also centre information flow. Our access control model protects resources from unauthorized accesses b multi-level security policies such as role, security level, integrity level and ownership.

  • PDF