Abstract
Dynamic policy enables the system to adjust the policies according to the changing circumstance, and makes the system more flexible and adaptive. We have proposed a dynamic model and the idea is to dynamically change the policy according to a pair of states rather than one state, which provides more information for the policy decision making, thus makes policy more accurate. The dynamic policy architecture based on this model is built in this paper, and we describe the components and steps of detecting a change, deciding the pair of current and previous states and picking up the policy according to the change.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Zang, C., et al.: A State-Transfer-Based Dynamic Policy Approach for Constraints in RBAC. In: Fan, W., Wu, Z., Yang, J. (eds.) WAIM 2005. LNCS, vol. 3739, pp. 755–760. Springer, Heidelberg (2005)
Sandhu, R.S., et al.: Role-based access control models. IEEE Computer 29(2), 38–47 (1996)
Huang, Y., et al.: Practical way to implement role-based access control in security administration system. Journal of Zhejiang University 38(4), 408–413 (2004)
Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A temporal role based access control model. ACM Transactions on Information and System Security 4(3), 191–233 (2001)
Joshi, J.B.D., Bertino, E., Ghafoor, A.: Temporal hierarchies and inheritance semantics for GTRBAC. In: Proc. 7th ACM Symp. on Access Control Model and Technologies, pp. 74–83 (2002)
Neumann, G., Strembeck, M.: An Approach to Engineer and Enforce Context Constraints in an RBAC Environment. In: Proc. SACMAT’03, Villa Galllia, Italy, pp. 65–79 (2003)
Bhide, M., et al.: Data Dynamic access control framework based on events: a demonstration. In: Proc. 19th Int. Conf. on Engi., pp. 765–767 (2003)
Edjlali, G., Acharya, A., Chaudhary, V.: History-based Access Control for Mobile Code. In: Proc. 5th ACM Conference on Computer and Communications Security (1998)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zang, C., Huang, Z., Chen, K., Dong, J. (2007). An Architecture Approach to Dynamic Policy in RBAC. In: Shen, W., Luo, J., Lin, Z., Barthès, JP.A., Hao, Q. (eds) Computer Supported Cooperative Work in Design III. CSCWD 2006. Lecture Notes in Computer Science, vol 4402. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72863-4_64
Download citation
DOI: https://doi.org/10.1007/978-3-540-72863-4_64
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-72862-7
Online ISBN: 978-3-540-72863-4
eBook Packages: Computer ScienceComputer Science (R0)