• Title/Summary/Keyword: RBAC

Search Result 219, Processing Time 0.03 seconds

Integrated Privacy Protection Model based on RBAC (RBAC에 기초한 통합형 프라이버시 보호 모델)

  • Cho, Hyug-Hyun;Park, Hee-Man;Lee, Young-Lok;Noh, Bong-Nam;Lee, Hyung-Hyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.135-144
    • /
    • 2010
  • Privacy protection can only be achieved by enforcing privacy policies within an enterprise's on and offline data processing systems. There are P-RBAC model and purpose based model and obligations model among privacy policy models. But only these models each can not dynamically deal with the rapidly changing business environment. Even though users are in the same role, on occasion, secure system has to opt for a figure among them who is smart, capable and supremely confident and to give him/her a special mission during a given period and to strengthen privacy protection by permitting to present fluently access control conditions. For this, we propose Integrated Privacy Protection Model based on RBAC. Our model includes purpose model and P-RBAC and obligation model. And lastly, we define high level policy language model based XML to be independent of platforms and applications.

An Extended Role-Based Access Control Model with Multi-level Security Control (다단계 보안통제가 가능한 확장된 역할 기반 접근통제 모델)

  • Yim, Hwang-Bin;Park, Dong-Gue
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.3
    • /
    • pp.90-96
    • /
    • 2002
  • RBAC(Role-Based Access Control) is an access control method based on the user's role and it provides more flexibility on the various computer and network security fields. But, RBAC models consider only users for roles or permissions, so for the purpose of exact access control within real application systems, it is necessary to consider additional subjects and objects. In this paper, we propose an Extended RBAC model, $ERBAC_3$, for access control of multi-level security system by adding users, subjects, objects and roles level to RBAC, which enables multi-level security control. 

Role Based Access Control Model contains Role Hierarchy (역할계층을 포함하는 역할기반 접근통제 모델)

  • 김학범;김석우
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.49-58
    • /
    • 2002
  • RBAC(Role Based Access Control) is an access control method based on the application concept of role instead of DAC(Discretionary Access Control) or MAC(Mandatory Access Control) based on the abstract basic concept. Model provides more flexibility and applicability on the various computer and network security fields than the limited 1functionality of kernel access control orginated from BLP model. In this paper, we propose $ERBAC_0$ (Extended $RBAC_0$ ) model by considering subject's and object's roles and the role hierarchy result from the roles additionally to $RBAC_0$ base model. The proposed $ERBAC_0$ model assigns hierarchically finer role on the base of subject and object level and provides flexible access control services than traditional $RBAC_0$ model.

  • PDF

Role-Based Access Control in Object-Oriented GIS (객체지향 지리정보시스템에서의 역할 기반 접근 제어)

  • Kim, Mi-Yeon;Lee, Cheol-Min;Lee, Dong-Hoon;Moon, Chang-Joo
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.3
    • /
    • pp.49-77
    • /
    • 2007
  • Role-based access control (RBAC) models are recently receiving considerable attention as a generalized approach to access control. In line with the increase in applications that deal with spatial data. an advanced RBAC model whose entities and constraints depend on the characteristics of spatial data is required. Even if some approaches have been proposed for geographic information systems. most studies focus on the location of users instead of the characteristics of spatial data. In this paper. we extend the traditional RBAC model in order to deal with the characteristics of spatial data and propose new spatial constraints. We use the object-oriented modeling based on open GIS consortium geometric model to formalize spatial objects and spatial relations such as hierarchy relation and topology relation. As a result of the formalization for spatial relations. we present spatial constraints classified according to the characteristics of each relation. We demonstrate our extended-RBAC model called OOGIS-RBAC and spatial constraints through case studies. Finally. we compare our OOGIS-RBAC model and the DAC model in the management of access control to prove the efficiency of our model.

  • PDF

RFID Security Authentication Protocol Using RBAC (RBAC을 이용한 RFID보안 인증 프로토콜)

  • Bae, Woo-Sik;Lee, Jong-Yun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2008.05a
    • /
    • pp.215-217
    • /
    • 2008
  • RFID 시스템은 향후 바코드를 대체하고 우리 생활 전반에 걸쳐 사용될 획기적인 시스템 이지만 태그의 정보가 외부에 노출될 경우 심각한 문제가 발생 할 수 있다. 본 논문에서는 여러 보안 문제중 프라이버시 보호를 위해 RBAC 기반으로 리더의 권한을 배분하여 태그가 데이터를 선별적으로 전송하고 태그가 리더로부터 수신한 난수로부터 매 세션마다 비밀키 및 실시간으로 새로운 해쉬 함수를 생성하는 인증 프로토콜을 제안한다. 제안된 RBAC를 이용한 해쉬 기반 인증 프로토콜은 각종 공격에 대해 안전하며 연산을 최소화하여 다양한 적용성을 제공한다.

  • PDF

A Time Constraints Permission Based Delegation Model in RBAC (RBAC을 기반으로 하는 시간제한 권한 위임 모델)

  • Kim, Tae-Shik;Chang, Tae-Mu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.163-171
    • /
    • 2010
  • RBAC(Role-Based Access Control) has advantages in managing access controls, because it offers the role inheritance and separation of duty in role hierarchy structures. Delegation is a mechanism of assigning access rights to a user. RBDM0 and RDM2000 models deal with user-to-user delegation. The unit of delegation in them is a role. However, RBAC does not process delegation of Role or Permission effectively that occurs frequently in the real world. This paper proposes a Time Constraints Permission-Based Delegation Model(TCPBDM) that guarantees permanency of delegated permissions and does not violate security principle of least privilege and separation of duty. TCPBDM, based on the well-known RBAC96, supports both user-to-user and role-to-role delegation with time constraints. A delegator can give permission to a specific person, that is delegatee, and the permission can be withdrawn whenever the delegator wants. Our model is analyzed and shown to be effective in the present paper.

Design of Role Information Storage for Role-Based Access Control (RBAC 을 위한 역할 정보 저장소의 설계)

  • Kim Won-Il;Ha Hong-Joon;Lee Chang-Hun
    • Annual Conference of KIPS
    • /
    • 2006.05a
    • /
    • pp.881-884
    • /
    • 2006
  • RBAC 은 기업이나 조직이 필요로 하는 유연한 조직의 관리와 각 업무가 갖는 책임과 권한을 정교하게 제공할 수 있는 접근제어 방법이다. RBAC 은 사용자와 역할 그리고 허가로 구성되어 사용자와 역할간의 관계, 역할과 허가의 관계를 통해 접근제어를 수행하며 역할의 범위에 따라 유연한 접근제어를 제공한다. 여기에 정교한 접근제어를 제공하기 위해 각 역할이 수행할 수 있는 작업의 한계를 제약조건으로 두어 제약조건에 위배되는 작업을 수행할 수 없도록 구성되어 있다. 그러나, 하나의 역할 정보만을 유지하는 형태로 구성되어 있어 의무 분리나 상속에 의한 여러 가지 연산 부하가 발생한다. 본 논문에서는 기본적인 RBAC 의 기능을 만족하고, 최근 발표된 NIST 의 RBAC 표준을 준수하며, 허가 및 역할 변경에서 발생할 수 있는 여러 부하를 줄일 수 있는 역할 저장소의 모델을 제안한다.

  • PDF

Study on The RBAC Protocol of Medical Information System (의료정보시스템의 RBAC 프로토콜 연구)

  • Lim, Kyeong Suk;Kim, Jeom Goo
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.77-84
    • /
    • 2016
  • In general RBAC(Role-Based-Access Control) model, senior role has junior role's permissions by virtue of role hierarchy. But although the opposite case is needed partially in medical institutions, such case cannot be performed in medical information systems. This is because inheritances of permissions in role hierarchies are static. In order to tackle this problem, this paper defined a dynamic role assignment, thereby proposed the way for the junior temporarily to be able to perform the permissions of the senior, and showed the applications of medical information systems.

RBAC Method using Certificates (인증서를 이용한 역할기반 접근제어방안)

  • Park, Chong-Hwa;Kim, Ji-Hong
    • The Journal of Information Technology
    • /
    • v.6 no.1
    • /
    • pp.11-20
    • /
    • 2003
  • With the development of Information Communication Technique, electronic commerce using PKIs is widely used over the Internet. The goal of access control is to counter the threat of unauthorized operations involving Web-server or data base systems. The RBAC(Role-Based Access Control) has recently received considerable attention as a promising alternative to traditional discretionary and mandatory access controls. In this paper we propose two methods, the RBAC system using attribute certificates and the RBAC system using SPKI certificates. And we analyze and compare the two methods.

  • PDF

Implementation of Secure Role Based Access Control System on the WWW (WWW에서 안전한 역할 기반 접근 제어 시스템 구현)

  • 이희규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.1
    • /
    • pp.65-75
    • /
    • 2000
  • 역할 기반 접근 제어(RBAC: Role Based Access Control)는 각 시스템 자원의 안전성을 보장하기 위한 접근 제어 기술이다. 거대한 네트워크에서 보안 관리의 복잡성과 비용을 줄여주는 기능 때문에, 특히 상업적인 분야에서 더욱 큰 관심을 끌고 있다. 본 논문에서는 RBAC 역할 계층 구조 개념만을 사용할 경우의 취약점을 해결하기 위해 두 가지 연산을 제시하였다. 그리고 이를 통하여 사용자와 권한(pemission)을 간접적으로 연관시킴으로써, RBAC 관리자가 사용자마다 연산을 추가하거나 삭제할 수 있도록 하였고 직관적인 관리자 인터페이스를 제공하여 관리자가 쉽게 사용자 역할, 그리고 연산 사이의 관계를 파악할 수 있도록 하였다. 그리고 이를 기반으로 RBAC 시스템을 설계하고 대학의 종합정보 시스템을 모델로 구현하였다.