{"title":"动态角色中心RBAC模型的内省研究","authors":"A. Suganthy, V. Prasanna Venkatesan","doi":"10.1109/ICSCAN.2019.8878827","DOIUrl":null,"url":null,"abstract":"With the advent of internet and its related technologies, the organizations are more concerned in providing security to their resources. Access control models helps in providing the access limits to the users when the resources are being accessed by them and Role based access control (RBAC) model is one such access control mechanism in which the users access the resources based on the roles they acquire in the system. In the dynamic environment, the roles that an user acquires in the system is completely depending on the context in which the user sends an access request. This paper explores the concepts of RBAC models and their extensions. The main objective of this paper is to analyse the access control models by identifying their applications and limitations in the real world applications.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An Introspective Study on Dynamic Role-Centric RBAC Models\",\"authors\":\"A. Suganthy, V. Prasanna Venkatesan\",\"doi\":\"10.1109/ICSCAN.2019.8878827\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the advent of internet and its related technologies, the organizations are more concerned in providing security to their resources. Access control models helps in providing the access limits to the users when the resources are being accessed by them and Role based access control (RBAC) model is one such access control mechanism in which the users access the resources based on the roles they acquire in the system. In the dynamic environment, the roles that an user acquires in the system is completely depending on the context in which the user sends an access request. This paper explores the concepts of RBAC models and their extensions. The main objective of this paper is to analyse the access control models by identifying their applications and limitations in the real world applications.\",\"PeriodicalId\":363880,\"journal\":{\"name\":\"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)\",\"volume\":\"116 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSCAN.2019.8878827\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSCAN.2019.8878827","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
摘要
随着互联网及其相关技术的出现,组织越来越关注其资源的安全性。访问控制模型有助于在用户访问资源时对其进行访问限制,基于角色的访问控制(Role based Access control, RBAC)模型就是这样一种访问控制机制,用户根据在系统中获得的角色来访问资源。在动态环境中,用户在系统中获得的角色完全取决于用户发送访问请求的上下文。本文探讨了RBAC模型的概念及其扩展。本文的主要目的是通过识别访问控制模型在实际应用中的应用和局限性来分析访问控制模型。
An Introspective Study on Dynamic Role-Centric RBAC Models
With the advent of internet and its related technologies, the organizations are more concerned in providing security to their resources. Access control models helps in providing the access limits to the users when the resources are being accessed by them and Role based access control (RBAC) model is one such access control mechanism in which the users access the resources based on the roles they acquire in the system. In the dynamic environment, the roles that an user acquires in the system is completely depending on the context in which the user sends an access request. This paper explores the concepts of RBAC models and their extensions. The main objective of this paper is to analyse the access control models by identifying their applications and limitations in the real world applications.