|
For Full-Text PDF, please login, if you are a member of IEICE,
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
|
Extending a Role Graph for Role-Based Access Control
Yoshiharu ASAKURA Yukikazu NAKAMOTO
Publication
IEICE TRANSACTIONS on Information and Systems
Vol.E92-D
No.2
pp.211-219 Publication Date: 2009/02/01 Online ISSN: 1745-1361
DOI: 10.1587/transinf.E92.D.211 Print ISSN: 0916-8532 Type of Manuscript: Special Section PAPER (Special Section on Foundations of Computer Science) Category: Keyword: RBAC, role graph, transformation algorithm, equivalence,
Full Text: PDF(671.7KB)>>
Summary:
Role-based access control (RBAC) is widely used as an access control mechanism in various computer systems. Since an organization's lines of authority influence the authorized privileges of jobs, roles also form a hierarchical structure. A role graph is a model that represents role hierarchies and is suitable for the runtime phase of RBAC deployment. Since a role graph cannot take various forms for given roles and cannot handle abstraction of roles well, however, it is not suitable for the design phase of RBAC deployment. Hence, an extended role graph, which can take a more flexible form than that of a role graph, is proposed. The extended role graph improves diversity and clarifies abstraction of roles, making it suitable for the design phase. An equivalent transformation algorithm (ETA), for transforming an extended role graph into an equivalent role graph, is also proposed. Using the ETA, system administrators can deploy efficiently RBAC by using an extended role graph in the design phase and a standard role graph in the runtime phase.
|
|