Advanced permission-role relationship in role-based access control
Paper
Paper/Presentation Title | Advanced permission-role relationship in role-based access control |
---|---|
Presentation Type | Paper |
Authors | Li, Min (Author), Wang, Hua (Author), Plank, Ashley (Author) and Yong, Jianming (Author) |
Editors | Mu, Yi, Susilo, Willy and Seberry, Jennifer |
Journal or Proceedings Title | Lecture Notes in Computer Science (Book series) |
Journal Citation | 5107, pp. 391-403 |
Number of Pages | 13 |
Year | 2008 |
Publisher | Springer |
Place of Publication | Germany |
ISSN | 1611-3349 |
0302-9743 | |
ISBN | 9783540699712 |
Digital Object Identifier (DOI) | https://doi.org/10.1007/978-3-540-70500-0-29 |
Web Address (URL) of Paper | https://link.springer.com/chapter/10.1007/978-3-540-70500-0_29 |
Web Address (URL) of Conference Proceedings | https://link.springer.com/book/10.1007/978-3-540-70500-0 |
Conference/Event | ACISP 2008: 13th Australasian Conference on Information Security and Privacy |
Event Details | Rank B B B B |
Event Details | ACISP 2008: 13th Australasian Conference on Information Security and Privacy Event Date 07 to end of 09 Jul 2008 Event Location Wollongong, Australia |
Abstract | Permission-role assignment is an important issue in role-based access control (RBAC). There are two types of problems that may arise in permission-role assignment. One is related to authorization granting process. Conflicting permissions may be granted to a role, and as a result, users with the role may have or derive a high level of authority. The other is related to authorization revocation. When a permission is revoked from a role, the role may still have the permission from other roles. In this paper, we discuss granting and revocation models related to mobile and immobile memberships between permissions and roles, then provide proposed authorization granting algorithm to check conflicts and help allocate the permissions without compromising the security. To our best knowledge, the new revocation models, local and global revocation, have not been studied before. The local and global revocation algorithms based on relational algebra and operations provide a rich variety. We also apply the new algorithms to an anonymity scalable payment scheme. |
Keywords | RBAC; role-based access control; permission-role assignment |
ANZSRC Field of Research 2020 | 460599. Data management and data science not elsewhere classified |
460499. Cybersecurity and privacy not elsewhere classified | |
460905. Information systems development methodologies and practice | |
Public Notes | File reproduced in accordance with the copyright policy of the publisher/author. |
Byline Affiliations | Department of Mathematics and Computing |
School of Information Systems |
https://research.usq.edu.au/item/9yv6z/advanced-permission-role-relationship-in-role-based-access-control
Download files
Accepted Version
Li_Wang_Plank_Yong_ACISP2008_Author's_version.pdf | ||
File access level: Anyone |
Other Documentation
Proceedings_of_the_13th_Australasian_conference_on_Information_Security_and_Privacy.pdf | ||
File access level: Anyone |
2082
total views1210
total downloads1
views this month0
downloads this month