Skip to main content

Rule Based Authorization Management Using User Context and ROLE

  • Conference paper
Convergence and Hybrid Information Technology (ICHIT 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 310))

Included in the following conference series:

  • 1083 Accesses

Abstract

A source code included user context is limit of existing RBAC models under personnel changes or business changes. This research proposed the authorization model and design, which is defined the rule based on tabular using user context which was hard coded in source code in order to resolve the limit of RBAC model. The proposed authorization management was defined as the two stages of authorization model and authorization design. An authorization model was modeled rule using RBAC and user context, authorization design was designed as tabular based using User Context. In order to verify the efficiency of authorization management was compared and analyzed other RBAC models.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sandhu, R., Coyne, E., et al.: Role Based Access Control Models. IEEE Computer 29(2) (February 1996)

    Google Scholar 

  2. Hoffman, J.: Implementing RBAC on a Type Enforced System. IEEE (1997)

    Google Scholar 

  3. Oh, S., Park, S.: Enterprise Model as a Basis of Administration on Role-Based Access Control. IEEE (2001)

    Google Scholar 

  4. Dridi, F., Muschall, B., Pernul, G.: Administration of an RBAC system. IEEE (2004)

    Google Scholar 

  5. Poniszewska-Maranda, A.: Role engineering of information system using extended RBAC model. In: Proc. of the 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE 2005). IEEE (2005)

    Google Scholar 

  6. Zhang, Z., Sandhu, R., et al.: ROBAC: Scalable Role And Organization Based Access Control Models. IEEE (2006)

    Google Scholar 

  7. Zhang, X., Li, Q., et al.: A Decentralized RBAC Model and Its User-Role Administration. IEEE (2007)

    Google Scholar 

  8. Zhou, W., Meinel, C.: Team and Task Based RBAC Access Control Model. IEEE (2007)

    Google Scholar 

  9. Al-Kahtani, M., Sandhu, R.: A Model for Attribute-Based User-Role Assignment. In: Proceedings of the 18th Annual Computer Security Applications Conference, Las Vegas, Nevada, USA, pp. 353–362 (December 2002)

    Google Scholar 

  10. Sandhu, R., Ferraiolo, D., Kuhn, R.: The NIST Model for Role-Based Access Control: Towards A Unified Standard. In: RBAC 2000 Proceedings of the Fifth ACM Workshop on Role-Based Access Control. ACM (2000)

    Google Scholar 

  11. Giuri, L., Iglio, P.: Role Templates for Content-Based Access Control. In: RBAC 1997 Proceedings of the Second ACM Workshop on Role-Based Access Control. ACM (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ahn, S., Rhew, S. (2012). Rule Based Authorization Management Using User Context and ROLE. In: Lee, G., Howard, D., Ślęzak, D., Hong, Y.S. (eds) Convergence and Hybrid Information Technology. ICHIT 2012. Communications in Computer and Information Science, vol 310. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32692-9_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32692-9_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32691-2

  • Online ISBN: 978-3-642-32692-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics