Search results for "Role-based access control"
showing 8 items of 8 documents
Trust-aware RBAC
2012
Published version of a chapter in the book: Computer Network Security. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-33704-8_9 In this paper we propose a trust-aware enhancement of RBAC (TA-RBAC) that takes trustworthiness of users into consideration explicitly before granting access. We assume that each role in the framework is associated with an expression that describe trustworthiness of subjects required to be able to activate the role, and each subject (user) has assigned trustworthiness level in the system. By adding trustworthiness constraints to roles we enhance system, for example, with more flexible ability to delegate roles, to control reading/updating…
Constrained Role Mining
2013
Role Based Access Control (RBAC) is a very popular access control model, for long time investigated and widely deployed in the security architecture of different enterprises. To implement RBAC, roles have to be firstly identified within the considered organization. Usually the process of (automatically) defining the roles in a bottom up way, starting from the permissions assigned to each user, is called {\it role mining}. In literature, the role mining problem has been formally analyzed and several techniques have been proposed in order to obtain a set of valid roles. Recently, the problem of defining different kind of constraints on the number and the size of the roles included in the resu…
Enforcing mobile security with location-aware role-based access control
2013
This paper describes how location-aware role-based access control RBAC can be implemented on top of the Geospatial eXtensible Access Control Markup Language GeoXACML. It furthermore sketches how spatial separation of duty constraints both static and dynamic can be implemented using GeoXACML on top of the XACML RBAC profile. The solution uses physical addressing of geographical locations, which facilitates easy deployment of authorisation profiles to the mobile device. Location-aware RBAC can be used to implement location-dependent access control and also other security enhancing solutions on mobile devices, such as location-dependent device locking, firewall, intrusion prevention or payment…
A MAS Security Framework Implementing Reputation Based Policies and Owners Access Control
2006
Multi-agent systems expose users to risks related to lack of knowledge above interacting users. Such systems should provide tools to protect their own resources from illegal accesses by unauthorized users. This paper describes a security framework for Multi-agent systems preventing a trusted agent to interact with malicious agents and granting agent and platform resources. This feature is obtained adding an access control mechanism that joins the benefits of Credential Based Access Control, Role Based Access Control and Mandatory Access Control. Authorizations and access control policies are set by XML based policy files. A case study on a distributed document retrieval system is also illus…
A novel scheme for privacy preserving in RBAC
2013
Role Based Access Control (RBAC) Model has been proved to be quite useful and has drawn a lot of research interest over the last fifteen years. In this paper we discuss general context-aware RBAC model. We analyze potential privacy threats associated with use of context-aware RBAC and propose a novel scheme that provides privacy-preserving for access models based on RBAC.
Attribute based access control scheme with controlled access delegation for collaborative E-health environments
2017
Abstract Modern electronic healthcare (e-health) settings constitute collaborative environments with complex access requirements. Thus, there is a need for sophisticated fine-grained access control mechanisms to cater these access demands and thereby experience the full potential of e-health systems. In order to realize a flexible access control scheme, integrating access delegation is of paramount importance. However, access delegation has to be enforced in a controlled manner so that it will not jeopardize the security of the system. In this paper, we addressed this issue through proposing an attribute based access control scheme integrated with controlled access delegation capabilities. …
Mobile Security with Location-Aware Role-Based Access Control
2012
Published version of an article from the book: Security and privacy in mobile information and communication systems. Also available on SpringerLink: http://dx.doi.org/10.1007/978-3-642-30244-2_15 This paper describes how location-aware Role-Based Access Control (RBAC) can be implemented on top of the Geographically eXtensible Access Control Markup Language (GeoXACML). It furthermore sketches how spatial separation of duty constraints (both static and dynamic) can be implemented using GeoXACML on top of the XACML RBAC profile. The solution uses physical addressing of geographical locations which facilitates easy deployment of authorisation profiles to the mobile device. Location-aware RBAC c…
Enforcing role based access control model with multimedia signatures.
2009
International audience; Recently ubiquitous technology has invaded almost every aspect of the modern life. Several application domains, have integrated ubiquitous technology to make the management of resources a dynamic task. However, the need for adequate and enforced authentication and access control models to provide safe access to sensitive information remains a critical matter to address in such environments. Many security models were proposed in the literature thus few were able to provide adaptive access decisions based on the environmental changes. In this paper, we propose an approach based on our previous work [B.A. Bouna, R. Chbeir, S. Marrara, A multimedia access control languag…