• Title/Summary/Keyword: Role Based Access Control

Search Result 270, Processing Time 0.026 seconds

FuRBAC : Function-Unit Delegation On Role-Based Access Control Model (FuRBAC 모델 : 권한위임이 기능단위로 설정 가능한 역할 기반 접근제어 모델)

  • Choi, Jun-Young;Cho, Nam-Deok;Yun, E.Joong
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.1-9
    • /
    • 2006
  • With role-based access control, access decisions are based on the roles that individual users have as part of an organization. In this paper, we propose a new RBAC model that a user delegate a permission to another user with function-unit for practical organization. A function-unit delegation is more safe than existing delegations on RBAC model. And FuRBAC model has a authentication to supervise security problems.

  • PDF

A Study on Architecture of Access Control System with Enforced Security Control for Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경을 위한 보안통제가 강화된 접근제어 시스템 설계에 관한 연구)

  • Eom, Jung-Ho;Park, Seon-Ho;Chung, Tai-Myoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.71-81
    • /
    • 2008
  • In the paper, we designed a context aware task-role based access control system(CAT-RACS) which can control access and prevent illegal access efficiently for various information systems in ubiquitous computing environment. CAT-RACS applied CA-TRBAC, which adds context-role concept for achieve policy composition by context information and security level attribute to be kept confidentiality of information. CA-TRBAC doesn't permit access when context isn't coincident with access control conditions, or role and task's security level aren't accord with object's security level or their level is a lower level, even if user's role and task are coincident with access control conditions. It provides security services of user authentication and access control, etc. by a context-aware security manager, and provides context-aware security services and manages context information needed in security policy configuration by a context information fusion manager. Also, it manages CA-TRBAC policy, user authentication policy, and security domain management policy by a security policy manager.

A Role Based Access Control Method Considering Tasks in the Mobile Agent-based Workflow System

  • Jeong, Seong-Min;Han, Seung-Wan;Lim, Hyeong-Seok
    • Proceedings of the IEEK Conference
    • /
    • 2000.07a
    • /
    • pp.549-552
    • /
    • 2000
  • We address an access control in the mobile agent-based workflow system. The Role Based Access Control (RBAC) is suitable to model the access control for business processes. However, current RBAC models are not adequate to mobile agent-based workflow system. Because separation of duties becomes complicated and it is impossible to perform several workflows at the same time. To solve these problems, we limit the scope of privilege within the specified task. We define considerations, specification of constraints needed in RBAC when tasks are involved. Also, we present an access control scenario and algorithms in the mobile agent-based workflow system.

  • PDF

Extended Role-Based Access Control with Context-Based Role Filtering

  • Liu, Gang;Zhang, Runnan;Wan, Bo;Ji, Shaomin;Tian, Yumin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1263-1279
    • /
    • 2020
  • Activating appropriate roles for a session in the role-based access control (RBAC) model has become challenging because of the so-called role explosion. In this paper, factors and issues related to user-driven role management are analysed, and a session role activation (SRA) problem based on reasonable assumptions is proposed to describe the problem of such role management. To solve the SRA problem, we propose an extended RBAC model with context-based role filtering. When a session is created, context conditions are used to filter roles that do not need to be activated for the session. This significantly reduces the candidate roles that need to be reviewed by the user, and aids the user in rapidly activating the appropriate roles. Simulations are carried out, and the results show that the extended RBAC model is effective in filtering the roles that are unnecessary for a session by using predefined context conditions. The extended RBAC model is also implemented in the Apache Shiro framework, and the modifications to Shiro are described in detail.

User-Level Delegation in Role-Based Access Control Model (역할기반 접근제어에 기초한 사용자 수준의 위임 기법)

  • 심재훈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.3
    • /
    • pp.49-62
    • /
    • 2000
  • Role-Based Access Control(RBAC) has recently received considerable attention as a alternative to traditional discretionary and mandatory access control to apply variant organizations function hierarchy of commercial or govemment. Also RBAC provides a delegation that is one of control principles in organization. In general delegation occurring in real organization is performed by an user giving permissions to another user. But, RBAC cannot implement these user-level delegation correctly. And delegation result in security problem such as destroying separation of duty policy information disclosure due to inappro-priate delegation. Besides security adminsitrator directly deals with that problem. In this thesis we suggests some methods that is created by the user.

Role-based User Access Control with Working Status for u-Healthcare System (u-Healthcare 시스템을 위한 RBAC-WS)

  • Lee, Bong-Hwan;Cho, Hyun-Sug
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.173-180
    • /
    • 2010
  • Information technology is being applied to the development of ubiquitous healthcare system, which provides both efficient patient care and convenient treatment regardless of patient's location. However, the increasing number of users and medical information give rise to the problem of user management and the infringement of privacy. In order to address this problem we propose a user access scheme based on the RBAC (Role Based Access Control) model. The preceding trust management model for Grid security, FAS(Federation Agent Server), was analyzed and extended to provide supplementary functions for role-based access control in u-Healthcare system. The RBAC model provides efficient user management and access control, but very vulnerable in case when one with valid role tries to leak confidential inner medical information. In order to resolve this problem, a RBAC-WS (Work Status with RBAC) model has been additionally developed which allows only qualified staffs to access the system while on duty. Th proposed RBAC and RBAC-WS model have been merged together and applied to the PACS (Picture Archiving and Communication System).

An Task-Role Assignment Model for Workflow Task of TRBAC (TRBAC의 워크 플로우 과업을 고려한 과업역할할당(TRA) 모델)

  • 박동규;임황빈;황유동;정지은
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05d
    • /
    • pp.936-940
    • /
    • 2002
  • 역할기반 접근통제(RBAC, Role-Based Access Control)의 개념은 접근통제의 전통적인 강제적 접근통제(MAC, Mandatory Access Control) 및 임의적 접근통제(DAC, Discretionary Access Control)의 대안으로서 많은 관심을 집중시키고 있다. 그러나 역할기반 접근통제를 워크 플로우 시스템에 그대로 적용할 경우에 의무 분리가 복잡해지고, 의무분리를 통해 상호 배타적인 역할을 가지지 못하게 했을 때 서로 관계없는 워크 플로우를 동시에 처리 못하게 되는 문제점이 발생할 수 있다. 이것을 해결하기 위하여 기업 환경의 특성으로 고려한 과업 역할기반 접근제어 모델(TRBAC: Task Role Based Access Control)이 제안되었다. 본 논문에서는 TRBAC의 워크 플로우 과업 관리를 위하여 과업(Task)을 역할(Role)에 할당하는 과업 - 역할할당(TRA)모델을 제안하고 이를 구현한다.

  • PDF

An Implementation Method of Improved Document DRM for Preventing Information Leakage using RBAC Approach (RBAC을 이용한 정보유출 방지를 위한 보안성이 강화된 문서 DRM 구현)

  • Choi, Young Hyun;Eom, Jung Ho;Chung, Tai Myoung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.4
    • /
    • pp.57-66
    • /
    • 2011
  • We implemented the document DRM applying role based access control(RBAC) mechanism for preventing the information leakage of a document which is transmitted in network environment. It must prevent to access document not related to user role and duty, and must allow operation to document for improving security, considering user role and security level according to a document importance. We improved the security of document DRM by adding to the access control module applying RBAC for satisfying security requirements. Though the user access document, our system allows operation authorizations to document by the user's role & security level and the security attribute of RBAC. Our system prevents indiscriminate access to the documents by user who is not associated with the role, and prevents damage the confidentiality and integrity.

Design and Safety Analysis of a Role-Based Access Control Framework for Mobile Agents in Home Network Environments (홈 네트워크 환경에서 이동 에이전트의 역할에 기반한 접근제어 프레임워크 설계 및 안전성 평가)

  • Jung, Young-Woo;Ko, Kwang-Sun;Kim, Gu-Su;Eom, Young-Ik
    • The KIPS Transactions:PartC
    • /
    • v.14C no.6
    • /
    • pp.537-544
    • /
    • 2007
  • A home network is a residential local area network in which digital home appliances are connected with each other. Applying the mobile agent technology to the home network is expected to provide a new computing model. In particular, mobility and asynchronous ability of mobile agent can be used to reduce network traffic generated for managing home appliances. However, in order to apply the mobile agent concept to the home network, access control for mobile agents is necessary. In the existing home network system, there is one special server, sometimes called home server This server generally has mapping tables to be updated periodically, which describes access control lists between users' authorities and corresponding devices. In this paper, we propose a role-based access control framework with mobile agents in home networks. This framework, called Secure KAgent framework, is designed and implemented based on KAgent system. It has two main characteristics: to control access permissions based on Role-Based Access Control(RBAC) scheme and to safety assign roles to mobile agents by role tickets.

An Efficient Role Based Access Control Technique by Structuring of Role Specification Certificate (역할 명세 인증서의 구조화에 의한 효율적 역할기반 접근제어 기법)

  • Yang, Soo-Mi
    • Journal of Internet Computing and Services
    • /
    • v.6 no.5
    • /
    • pp.1-9
    • /
    • 2005
  • In a role based access control through attribute certificate, the use of role assignment certificates and role specification certificates can reduce management cost and the overhead incurred by changing roles, Highly distributed computing environments such as ubiquitous computing environments not having global or broad control. need another attribute certificate management technique, Actually just having role specification certificate separately reduce management cost, But for better performance we structure role specification, We group roles and make the role group relation tree, It results secure and efficient role renewing and distribution, For scalable role specification certificate distribution, the multicasting of packets is used, We take into account the packet lass and quantify performance enhancements of structuring role specification certificates.

  • PDF