Abstract
A source code included user context is limit of existing RBAC models under personnel changes or business changes. This research proposed the authorization model and design, which is defined the rule based on tabular using user context which was hard coded in source code in order to resolve the limit of RBAC model. The proposed authorization management was defined as the two stages of authorization model and authorization design. An authorization model was modeled rule using RBAC and user context, authorization design was designed as tabular based using User Context. In order to verify the efficiency of authorization management was compared and analyzed other RBAC models.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Sandhu, R., Coyne, E., et al.: Role Based Access Control Models. IEEE Computer 29(2) (February 1996)
Hoffman, J.: Implementing RBAC on a Type Enforced System. IEEE (1997)
Oh, S., Park, S.: Enterprise Model as a Basis of Administration on Role-Based Access Control. IEEE (2001)
Dridi, F., Muschall, B., Pernul, G.: Administration of an RBAC system. IEEE (2004)
Poniszewska-Maranda, A.: Role engineering of information system using extended RBAC model. In: Proc. of the 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE 2005). IEEE (2005)
Zhang, Z., Sandhu, R., et al.: ROBAC: Scalable Role And Organization Based Access Control Models. IEEE (2006)
Zhang, X., Li, Q., et al.: A Decentralized RBAC Model and Its User-Role Administration. IEEE (2007)
Zhou, W., Meinel, C.: Team and Task Based RBAC Access Control Model. IEEE (2007)
Al-Kahtani, M., Sandhu, R.: A Model for Attribute-Based User-Role Assignment. In: Proceedings of the 18th Annual Computer Security Applications Conference, Las Vegas, Nevada, USA, pp. 353–362 (December 2002)
Sandhu, R., Ferraiolo, D., Kuhn, R.: The NIST Model for Role-Based Access Control: Towards A Unified Standard. In: RBAC 2000 Proceedings of the Fifth ACM Workshop on Role-Based Access Control. ACM (2000)
Giuri, L., Iglio, P.: Role Templates for Content-Based Access Control. In: RBAC 1997 Proceedings of the Second ACM Workshop on Role-Based Access Control. ACM (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ahn, S., Rhew, S. (2012). Rule Based Authorization Management Using User Context and ROLE. In: Lee, G., Howard, D., Ślęzak, D., Hong, Y.S. (eds) Convergence and Hybrid Information Technology. ICHIT 2012. Communications in Computer and Information Science, vol 310. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32692-9_23
Download citation
DOI: https://doi.org/10.1007/978-3-642-32692-9_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32691-2
Online ISBN: 978-3-642-32692-9
eBook Packages: Computer ScienceComputer Science (R0)