Authorization algorithms for the mobility of user-role relationship
Paper
Paper/Presentation Title | Authorization algorithms for the mobility of user-role relationship |
---|---|
Presentation Type | Paper |
Authors | Wang, Hua (Author), Sun, Lili (Author), Zhang, Yanchun (Author) and Cao, Jinli (Author) |
Editors | Estivill-Castro, Vladimir |
Journal or Proceedings Title | Conferences in Research and Practice in Information Technology |
Journal Citation | 38, pp. 69-77 |
Number of Pages | 9 |
Year | 2005 |
Place of Publication | Sydney, Australia |
ISBN | 1920682201 |
Web Address (URL) of Paper | http://delivery.acm.org/10.1145/1090000/1082169/p69-wang.pdf?ip=139.86.2.14&acc=PUBLIC&CFID=51667743&CFTOKEN=55354070&__acm__=1320121744_32fb31ba0a7888a402404c6c64fde942 |
Conference/Event | ACSC 2005: 28th Australasian Computer Science Conference |
Event Details | ACSC 2005: 28th Australasian Computer Science Conference Event Date 28 Jan 2005 to end of 03 Feb 2005 Event Location Newcastle, Australia |
Abstract | The mobility of user-role relationship is a new feature relative to their counterparts in user-role assignments. When an administrative role assigns a role to a user with a mobile membership, this allows the user to use the permissions of the role and to be further added other roles by administrators. Immobile membership grants the user the authority to use the permissions, but does not make the user eligible for further role assignment. Two types of problems may arise in user-role assignment with the mobility of user-role relationship. One is related to authorization granting process. When a role is granted to a user, this role may be in conflict with other roles of the user or together with this role; the user may have or derive a high level of authority. Another is related to authorization revocation. When a role is revoked from a user, the user may still have the role from other roles. In this paper, we discuss granting and revocation models related to mobile and immobile memberships between users and roles, then provide proposed authorization granting, weak revocation and strong revocation algorithms that are based on relational algebra and operations. We also describe how to use the new algorithms with an anonymity scalable payment scheme. Finally, comparisons with other related work are made. |
Keywords | authorization; mobility; RBAC; user-role relationship |
ANZSRC Field of Research 2020 | 461399. Theory of computation not elsewhere classified |
460905. Information systems development methodologies and practice | |
460499. Cybersecurity and privacy not elsewhere classified | |
Public Notes | This paper appeared at 28th Australasian Computer Science Conference The University of Newcastle, Australia. Conferences in research and practice in information technology Vol. 38 V, Estivill-Castro, Ed. Reproduction for academic, non-for-profit purposes permitted provided this text is included. |
Byline Affiliations | Department of Mathematics and Computing |
Victoria University | |
La Trobe University |
https://research.usq.edu.au/item/9xq72/authorization-algorithms-for-the-mobility-of-user-role-relationship
Download files
1965
total views239
total downloads3
views this month1
downloads this month