Reference Hub1
Fuzzy Role Based Access Control Design using Fuzzy Ontology

Fuzzy Role Based Access Control Design using Fuzzy Ontology

Chandra Mouliswaran Subramanian, Aswani Kumar Cherukuri
Copyright: © 2019 |Volume: 10 |Issue: 4 |Pages: 19
ISSN: 1938-0232|EISSN: 1938-0240|EISBN13: 9781522564898|DOI: 10.4018/IJITPM.2019100105
Cite Article Cite Article

MLA

Subramanian, Chandra Mouliswaran, and Aswani Kumar Cherukuri. "Fuzzy Role Based Access Control Design using Fuzzy Ontology." IJITPM vol.10, no.4 2019: pp.118-136. http://doi.org/10.4018/IJITPM.2019100105

APA

Subramanian, C. M. & Cherukuri, A. K. (2019). Fuzzy Role Based Access Control Design using Fuzzy Ontology. International Journal of Information Technology Project Management (IJITPM), 10(4), 118-136. http://doi.org/10.4018/IJITPM.2019100105

Chicago

Subramanian, Chandra Mouliswaran, and Aswani Kumar Cherukuri. "Fuzzy Role Based Access Control Design using Fuzzy Ontology," International Journal of Information Technology Project Management (IJITPM) 10, no.4: 118-136. http://doi.org/10.4018/IJITPM.2019100105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Fuzzy role-based access control (FRBAC) is essential for risk-based environments in many futuristic applications, even though role-based access control (RBAC) is the efficient and widely used access control model for enterprise applications. In FRBAC, authorization related information is vague. It brings the fuzziness in mapping among the components of FRBAC such as user, role and permission. Holding the fuzziness in FRBAC, it is challenging for the security engineer to verify the constraints and correctness of access control policy. On verifying the constraints and correctness of access control policy, knowledge representation techniques are much useful in practice. In this scenario, representing FRBAC using fuzzy ontology might be the right choice for semantic web application. The main objective of this article is to represent the access permissions of FRBAC using fuzzy ontology and verify whether the constraints of FRBAC are possible to get implemented in it or not.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.