• Title/Summary/Keyword: Role-based Model

Search Result 2,754, Processing Time 0.033 seconds

Context Conflicts of Role-Based Access Control in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경의 역할 기반 접근제어에서 발생하는 상황 충돌)

  • Nam Seung-Jwa;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.37-52
    • /
    • 2005
  • Traditional access control models like role-based access control model are insufficient in security needs in ubiquitous computing environment because they take no thought of access control based on user's context or environment condition. In these days, although researches on context-aware access control using user's context or environment conditions based on role-based access control are emerged, they are on the primary stage. We present context definitions md an access control model to provide more flexible and dynamic context-aware access control based on role-based access control. Specially, we describe the conflict problems occurred in the middle of making an access decision. After classifying the conflict problems, we show some resolutions to solve them. In conclusion, we will lay the foundations of the development of security policy and model assuring right user of right object(or resource) and application service through pre-defined context and context classification in ubiquitous computing environments. Beyond the simplicity of access to objects by authorized users, we assure that user can access to the object, resource, or service anywhere and anytime according to right context.

A study on the AC and PMI model for the Defense computer network

  • Yoon, H.S.;Kim, S.C.;Song, J.S.
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.977-980
    • /
    • 2001
  • This paper is a study on the AC and PMI model for the defense computer network. It is suggested that the organization plan of PMI model is a proper model for the characteristics of military system and military defense network security demands based on defense PKI system. Futhermore, it will be presented both various types of defense AC and AC according to the role and clearance in PMI. Defense AC will provide strong users' authentication and Role Based Access Control to give more secured and trusted authentication service by using users' attribute such as role and clearance.

  • PDF

Design of the ERBAC for Role Delegations (역할 위임을 위한 ERBAC 설계)

  • Oh, Sug-Kyun;Kim, Seong-Ryeol
    • The KIPS Transactions:PartD
    • /
    • v.10D no.7
    • /
    • pp.1155-1160
    • /
    • 2003
  • This paper applies RBAC policy for solving on the security problems when it will be operated several business on the distributed environments and designed Extended RBAC (ERBAC) model that it is possible to manage security systems on the distributed environments. The designed ERBAC model is based on RBAC96 model due to Sandu et al and added role delegations. Therefor, the designed ERBAC model have the advantage of the following . it can be processed of business without interrupts and implemented server system without modifying its source code, high migration, easy and simple of secure managing.

Extended Role Based Access Control Model with Multilevel Security Control (다단계 보안통제가 가능한 확장된 역할기반 접근통제 모델)

  • Kim, Hak-Beom;Hong, Gi-Yung;Kim, Dong-Gyu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.6
    • /
    • pp.1886-1902
    • /
    • 2000
  • RBAC(Role Based Access Control) is an access control method based on the user's roles and it provides more flexibility and applicability on the various computer and network security fields than DAC(Discretionary Access Control) or MAC(Mandator Access Control). In this paper, e newly propose ERBAC\ulcorner(Extended RBAC\ulcorner) model by considering subject's and object's roles and security levels for roles additionally to RBAC\ulcorner model which is firstly proposed by Ravi S. Sandhu as a base model. The proposed ERBAC\ulcorner model provides finer grained access control with multilevel security on he base of subject and object level than RBAC\ulcorner model.

  • PDF

A Formal Specification of Role Graph Model Increasing Integrity (무결성이 강화된 역할 그래프 모델의 정형적 명세)

  • Choi EunBok;Lee HyeongOk
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.11
    • /
    • pp.1620-1629
    • /
    • 2004
  • The objectives of access control are to protect computing and communication resources from illegal use, alteration, disclosure and destruction by unauthorized users. Although Biba security model is well suited for protecting the integrity of information, it is considered too restrictive to be an access control model for commercial environments. And, Role-Based Access Control(RBAC) model, a flexible and policy-neutral security model that is being widely accepted in commercial areas, has a possibility for compromising integrity of information. In this paper, We present the role graph model which enhanced flexibility and integrity to management of many access permission. Also, In order to represent those rule and constraints clearly, formal descriptions of role assignment rule and constraints in Z language are also given.

  • PDF

A Development and Application of Role-Playing Instruction Model based on Mind Practice for Intensifying Information & Communication Ethics (정보통신윤리 의식 강화를 위한 마음공부기반 역할놀이 수업모형 개발 및 적용)

  • Baek, Hyeon-Gi;Yu, Jeong-Su
    • Journal of The Korean Association of Information Education
    • /
    • v.16 no.2
    • /
    • pp.181-188
    • /
    • 2012
  • In this study, we develop a role-playing instruction model based on mind practice. The proposed model can strengthen the information and communication ethics and enhance the will to act which leads to behavioral changes. It is also designed considering methodological and procedural elements of mind education and the steps of role-playing. It has much importance on having students experience mind practice directly and indirectly through role-playing. Firstly, an instruction model for a role-playing is designed based on other researches and case studies. Secondly, it was applied to students to find out the advantages and improvements and modified the earlier version and then, it was applied to 36 sophomores in J university in J city for five weeks. They are majoring in Education and are taking Instructional method and Instructional technology. To prove the effectiveness of the model, it was also applied 5th year 24 students, 6th year 26 students and 10 teachers in an elementary school. The results show that more than 90% students respond positively about how interesting information and communication ethics after participating in a role-playing instruction model based on mind practice.

  • PDF

An Integrated Management Model of OS-RBAC and Separation Of Duty Policy (OS-RBAC과 임무분리 정책의 통합 관리 모델)

  • Byun, Chang-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.1
    • /
    • pp.167-175
    • /
    • 2010
  • Like most large organizations, there are business rules such as 'separation of duty' and 'delegation' which should be considered in access control. From a SOD point of view, previous SOD models built on the (Administrative) Role-Based Access Control model cannot present the best solution to security problems such as information integrity by the limited constituent units such as role hierarchy and role inheritance. Thus, we propose a new integrated management model of administration role-based access control model and SOD policy, which is called the OS-SoDAM. The OS-SoDAM defines the authority range in an organizational structure that is separated from role hierarchy and supports a decentralized security officer-level SOD policy in which a local security officer can freely perform SOD policies within a security officer's authority range without the security officer's intervention.

과학기술정책을 위한 국가학습조직모형

  • 오형식;신상문
    • Journal of Technology Innovation
    • /
    • v.5 no.2
    • /
    • pp.22-47
    • /
    • 1997
  • This paper suggests a model of Living & Learning Nation as a new ploicy framework. It is a combination of Living Nation and Learning Nation. Living Nation model takes the nation as a living entity composed of spirit, resource, and communication : it grows but healthy and balanced growth is needed, its organs are closely connected, it has a circulation system, the 'spirit' factor plays the central role, etc.. Learning Nation model is a national level version of learning organization concept. The model defines new perspectives on the objectives, span of means, and the role of government in S&T policy. Therefore, the model can be used to give new insights to policymakers of developing countries facing the knowledge-based economy.

  • PDF

Design of a Simulation Model for Integrated Access Control (통합 접근 제어를 위한 시뮬레이션 모델 설계)

  • Lee Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.4 s.32
    • /
    • pp.49-54
    • /
    • 2004
  • Rule-based access control can not completely be replaced by identity-based access control. Neither can role-based access control be a merger of identity-based access control and rule-based access control, but can be used complementarily for each other. In this paper, is proposed a simulation model designed for a new integrated access control method that has been created by means of integrating the existing access control methods. The integrated access control method is equipped with security, integrity and flow control and can easily accomodate the requirements for access control from role-based corporate bodies. The simulation model proposed in this paper can be applied for real working system designs.

  • PDF

Task-Role-Based Access Control Model For Enterprise Environment (기업환경을 위한 과업-역할기반 접근제어 모델)

  • Oh, Se-Jong;Park, Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.1
    • /
    • pp.55-63
    • /
    • 2001
  • There are many information objects and users in a large company. It is important issue how to control users access in order that only authorized user can access information objects, Traditional access control models do not properly reflect the characteristics of enterprise environment. This paper proposes an improved access control model for enterprise environment. The characteristics of access control in an enterprise are examined and a task role-based access control(T-RBAC) model founded on concept of classification of tasks is introduced. T-RBAC deals with each task differently according to its class, and supports task level access control and supervision role hierarchy.