• Title/Summary/Keyword: Role-Base Access Control

Search Result 16, Processing Time 0.035 seconds

Role Based Access Control Model contains Role Hierarchy (역할계층을 포함하는 역할기반 접근통제 모델)

  • 김학범;김석우
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.49-58
    • /
    • 2002
  • RBAC(Role Based Access Control) is an access control method based on the application concept of role instead of DAC(Discretionary Access Control) or MAC(Mandatory Access Control) based on the abstract basic concept. Model provides more flexibility and applicability on the various computer and network security fields than the limited 1functionality of kernel access control orginated from BLP model. In this paper, we propose $ERBAC_0$ (Extended $RBAC_0$ ) model by considering subject's and object's roles and the role hierarchy result from the roles additionally to $RBAC_0$ base model. The proposed $ERBAC_0$ model assigns hierarchically finer role on the base of subject and object level and provides flexible access control services than traditional $RBAC_0$ model.

  • PDF

Extended Role Based Access Control Model with Multilevel Security Control (다단계 보안통제가 가능한 확장된 역할기반 접근통제 모델)

  • Kim, Hak-Beom;Hong, Gi-Yung;Kim, Dong-Gyu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.6
    • /
    • pp.1886-1902
    • /
    • 2000
  • RBAC(Role Based Access Control) is an access control method based on the user's roles and it provides more flexibility and applicability on the various computer and network security fields than DAC(Discretionary Access Control) or MAC(Mandator Access Control). In this paper, e newly propose ERBAC\ulcorner(Extended RBAC\ulcorner) model by considering subject's and object's roles and security levels for roles additionally to RBAC\ulcorner model which is firstly proposed by Ravi S. Sandhu as a base model. The proposed ERBAC\ulcorner model provides finer grained access control with multilevel security on he base of subject and object level than RBAC\ulcorner model.

  • PDF

Extended Role Based Access Control Model (확장된 역할기반 접근통제 모델)

  • 김학범;홍기융;김동규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.47-56
    • /
    • 1999
  • RBAC(Role Based Access Control) is an access control method based on the user's roles and it provides more flexibility and applicability on the various computer and network security fields than DAC(Discretionary Access Control) or MAC(Mandatory Access Control). In this paper, we newly propose ERBAC$_{0}$(Extended RBAC$_{0}$) model by considering subject's and object's roles additionally to REAC$_{0}$ model which is firstly proposed by Ravi S. Sandhu as a base model. The proposed ERBAC$_{0}$ model provides finer grained access control on the base of subject and object level than RBAC$_{0}$ model.

Context Access Control in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서의 컨텍스트 접근 제어 고찰)

  • Jung Heon-Man;Lee Se-Hoon
    • KSCI Review
    • /
    • v.14 no.1
    • /
    • pp.175-184
    • /
    • 2006
  • In this paper, we study to two research direction about information security in ubiquitous computing environment. First, researches on context-aware access control using user's context or environment conditions based on role-based control. Second, researches on model for access control about context information in ubiquitous computing utilizing role base access control model. Two research directions are the one of the most important point technology in that embody ubiquitous environment in the actual world.

  • PDF

Design of U-Healthcare Access Authority Control Model Using Context Constrain RBAC Model (상황제한 RBAC 모델을 이용한 U-헬스케어 접근권한 제어모델 설계)

  • Kim, Chang-Bok;Kim, Nam-Il;Park, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.233-242
    • /
    • 2009
  • The security of medical information need continued research about steady and flexible security model because of privacy of patient's as well as directly relation in the patient's life. In particular, u-healthcare environment is need flexible and detailed access control by variety changes of context. Control model analyzed relation of resource and authority, and analyzed authority about all accessible resource from access point using K2BASE. The context-based access control model can change flexibly authority change and role, and can obtain resource of authority granted and meaningly connected resource. As a result, this thesis can apply flexible and adaptive access control model at u-healthcare domain which context change various.

  • PDF

Role Graph Security Management Model based on Lattice (격자기반 역할그래프 보안 관리 모델)

  • Choi, Eun-Bok;Park, Ju-Gi;Kim, Jae-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.109-121
    • /
    • 2006
  • In this paper, we suggest lattice based role graph security management model which changes security level in mandatory access control model as well as constraint and role hierarchy systematically in role base access control model. In this model, we solved privilege abuse of senior role that is role graph model's problem, and when produce conflict between privileges, we can keep integrity of information by reseting grade of subject through constraint. Also, we offer strong security function by doing to be controlled by subject's security level as well as privilege inheritance by role hierarchy, Finally, we present the role graph algorithms with logic to disallow roles that contain conflicting privileges.

  • PDF

RBAC Method using Certificates (인증서를 이용한 역할기반 접근제어방안)

  • Park, Chong-Hwa;Kim, Ji-Hong
    • The Journal of Information Technology
    • /
    • v.6 no.1
    • /
    • pp.11-20
    • /
    • 2003
  • With the development of Information Communication Technique, electronic commerce using PKIs is widely used over the Internet. The goal of access control is to counter the threat of unauthorized operations involving Web-server or data base systems. The RBAC(Role-Based Access Control) has recently received considerable attention as a promising alternative to traditional discretionary and mandatory access controls. In this paper we propose two methods, the RBAC system using attribute certificates and the RBAC system using SPKI certificates. And we analyze and compare the two methods.

  • PDF

User-Level Delegation in Extended Role-Based Access Control Model (확장된 역할기반 접근제어 모델에서의 사용자 수준의 위임기법)

  • 박종화
    • The Journal of Information Technology
    • /
    • v.4 no.4
    • /
    • pp.15-24
    • /
    • 2001
  • In current role-based systems, security officers handle assignments of users to roles. This may increase management efforts in a distributed environment because of the continuous involvement from security officers. The role-based delegation provides a means for implementing RBAC in a distributed environment. The basic idea of a role-based delegation is that users themselves may delegate role authorities to other users to carry out some functions on behalf of the former. This paper presents a user-level delegation model, which is based on Extended Role-Based Access Control(ERBAC). ERBAC provides finer grained access control on the base of subject and object level than RBAC model.

  • PDF

A Role-Based Access Control Mechanism using Z language in Distributed System (분산시스템에서 Z언어를 이용한 역할기반 접근제어 메커니즘)

  • Choe, Eun-Bok;No, Bong-Nam
    • The KIPS Transactions:PartC
    • /
    • v.8C no.2
    • /
    • pp.113-121
    • /
    • 2001
  • 접근제어의 목적은 컴퓨팅 자원 및 통신 정보자원 등을 부당한 사용자로부터 사용되거나, 수정, 노출, 파괴와 같은 비합법적인 행위로부터 보호하는데 있다. 대표적인 보안 정책 중에서 Biba 모델은 정보의 무결성을 보장하지만 상업적인 환경에 적용되기는 다소 미흡하며, 역할기반 접근제어 정책은 상업적인 측면의 보안정책에 적용이 가능하지만 접근되는 객체의 중요도에 따른 보안등급이 고려되지 않았다. 본 논문에서는 Biba 모델의 보안등급을 역할기반접근제어 모델에 적용함으로써 주체가 해당 객체를 부당하게 변경하는 것을 방지함과 동시에 수많은 접근권한을 관리하는데 융통성을 제공한다. 그리고 제안한 접근제어 모델의 제약조건들을 정형 명세 언어인 Z언어를 통해 명확히 표현함으로써 정책 입안자나 프로그래머가 접근제어정책을 설계하고 구현하고자 할 때 프로그램 개발에 소요되는 시간을 단축할 수 있다. 또한, 제안한 모델을 망관리 객체의 연산과 등급을 갖는 역할과 제약조건을 사용하여 실제 운영되는 통신망 관리에 적용하여 봄으로써 정보의 무결성이 보장됨을 보였다.

  • PDF

Context awareness Access Control for Ubiquitous Environment (유비쿼터스 환경을 위한 상황 인식 접근제어)

  • Shin, Dong-Wook;Hwang, Yu-Dong;Park, Dong-Gue
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.5
    • /
    • pp.470-482
    • /
    • 2008
  • This paper propose role base access control model that use context information for ubiquitous environment. Concept of access control that use context information assigns permission that can approach in some information or object in part. And do so that can assigned user in part to it and acquire permission. So it can approach in information or object. Therefore, user approaches in information or object in assigned role, and the role that is allocated ro own is having. So, do so that can secure information or utilization of object safety. Proposa1 model investigated lacking restriction item in GEO-RBAC model. So, it considered that present new restriction condition and role conflict in various case. Also, to GEO-RBAC model proposed suitable model, analyzed old model's advantage, shortcoming. And it presented proposal model to GEO-RBAC because improving this.

  • PDF