IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Adding Context into an Access Control Model for Computer Security Policy

Adding Context into an Access Control Model for Computer Security Policy
View Sample PDF
Author(s): Shangping Ren (Illinois Institute of Technology, USA), Jeffrey J.P. Tsai (University of Illinois at Chicago, USA)and Ophir Frieder (Illinois Institute of Technology, USA)
Copyright: 2007
Pages: 18
Source title: Advances in Machine Learning Applications in Software Engineering
Source Author(s)/Editor(s): Du Zhang (California State University, USA)and Jeffery J.P. Tsai (University of Illinois at Chicago, USA)
DOI: 10.4018/978-1-59140-941-1.ch016

Purchase

View Adding Context into an Access Control Model for Computer Security Policy on the publisher's website for pricing and purchasing information.

Abstract

In this chapter, we present the role-based context constrained access control (RBCC) model. The model integrates contextual constraints specified in first-order logic with the standard role-based access control (RBAC). In the RBCC access control model, the permission assignment functions are constrained by the user’s current accessing contexts. The accessing contests are further categorized in two classes, that is, system contexts and application contexts. System contexts may contain accessing time, accessing location, and other security-related system information; while application contexts are abstractions of relationships among different types of entities (i.e., subjects, roles, and objects) as well as implicit relationships derived from protected information content and external information. The ability to integrate contextual information allows the RBCC model to be flexible and capable of specifying a variety of complex access policies and providing tight and just-intime permission activations. A set of medical domain examples will be used to demonstrate the expressiveness of the RBCC model.

Related Content

Bhargav Naidu Matcha, Sivakumar Sivanesan, K. C. Ng, Se Yong Eh Noum, Aman Sharma. © 2023. 60 pages.
Lavanya Sendhilvel, Kush Diwakar Desai, Simran Adake, Rachit Bisaria, Hemang Ghanshyambhai Vekariya. © 2023. 15 pages.
Jayanthi Ganapathy, Purushothaman R., Ramya M., Joselyn Diana C.. © 2023. 14 pages.
Prince Rajak, Anjali Sagar Jangde, Govind P. Gupta. © 2023. 14 pages.
Mustafa Eren Akpınar. © 2023. 9 pages.
Sreekantha Desai Karanam, Krithin M., R. V. Kulkarni. © 2023. 34 pages.
Omprakash Nayak, Tejaswini Pallapothala, Govind P. Gupta. © 2023. 19 pages.
Body Bottom