Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1082161.1082169dlproceedingsArticle/Chapter ViewAbstractPublication Pagesaus-cscConference Proceedingsconference-collections
Article
Free access

Authorization algorithms for the mobility of user-role relationship

Published: 01 January 2005 Publication History
  • Get Citation Alerts
  • Abstract

    The mobility of user-role relationship is a new feature relative to their counterparts in user-role assignments. When an administrative role assigns a role to a user with a mobile membership, this allows the user to use the permissions of the role and to be further added other roles by administrators. Immobile membership grants the user the authority to use the permissions, but does not make the user eligible for further role assignment. Two types of problems may arise in user-role assignment with the mobility of user-role relationship. One is related to authorization granting process. When a role is granted to a user, this role may be conflict with other roles of the user or together with this role; the user may have or derive a high level of authority. Another is related to authorization revocation. When a role is revoked from a user, the user may still have the role from other roles.In this paper, we discuss granting and revocation models related to mobile and immobile memberships between users and roles, then provide proposed authorization granting, weak revocation and strong revocation algorithms that are based on relational algebra and operations. We also describe how to use the new algorithms with an anonymity scalable payment scheme. Finally, comparisons with other related work are made.

    References

    [1]
    Barkley J. F., Beznosov K. and Uppal J. (1999), Supporting relationships in access control using role based access control, in 'Third ACM Workshop on RoleBased Access Control', pp. 55--65.]]
    [2]
    Bertino E., Castano S., Ferrari E. and Mesiti M. (2000), 'Specifying and enforcing access control policies for XML document sources', World Wide Web, 3 pp. 139--151.]]
    [3]
    David F. F., Dennis M. G. and Nickilyn L. (1993), An examination of federal and commercial access control policy needs, in 'NIST NCSC National Computer Security Conference', Baltimore, MD, pp. 107--116.]]
    [4]
    Feinstein H. L. (1995), Final report: Nist small business innovative research (sbir) grant: role based access control: phase 1. technical report, in 'SETA Corp.'.]]
    [5]
    Ferraiolo D. F. and Kuhn D. R. (1992), Role based access control, in '15th National Computer Security Conference', http: //www.citeseer.nj.nec.com/, pp. 554--563.]]
    [6]
    Ferraiolo D. F., Barkley J. F. and Kuhn D. R. (1999), Role-based access control model and reference implementation within a corporate intranet, in 'TISSEC, Vol. 2, pp. 34--64.]]
    [7]
    Oh S. and Sandhu R. (2002), A model for role administration using organization structure, in 'Seventh ACM Symposium on Access Control Models and Technologies', ACM Press, pp. 155--162.]]
    [8]
    Okamoto T. (1995), An efficient divisible electronic cash scheme, in 'Advances in Cryptology-Crypto'95', Vol. 963 of Lectures Notes in Computer Science, Springer-Verlag, pp. 438--451.]]
    [9]
    Rivest R. T. (1992), 'The MD5 message digest algorithm', Internet RFC 1321 .]]
    [10]
    Sandhu R. (1998a), Role activation hierarchies, in 'Third ACM Workshop on RoleBased Access Control', ACM Press, pp. 33--40.]]
    [11]
    Sandhu R. (1998b), 'Role-Based Access Control', Advances in Computers46.]]
    [12]
    Sandhu R. and Bhamidipati V. (North-Holland, 1997), 'The ura97 model for role-based administration of user-role assignment', T. Y. Lin and Xiao Qian, editors, Database Security XI: Status and Prospects pp. 262--275.]]
    [13]
    Sandhu R. and Munawer Q. (1999), The arbac99 model for administration of roles, in 'the Annual Computer Security Applications Conference', ACM Press, pp. 229--238.]]
    [14]
    Sandhu R. and Park J. S. (1998), Decentralized User-Role Assignment for Web-based Intranets, in '3th ACM Workshop on Role-Based Access Control', ACM Press, pp. 1--12.]]
    [15]
    Wang H., Cao J. and Kambayashi Y. (2002), Building a consumer anonymity scalable payment protocol for the internet purchases, in '12th International Workshop on Research Issues on Data Engineering: Engineering E-Commerce/E-Business Systems', San Jose, USA.]]
    [16]
    Wang H., Cao J. and Zhang Y. (2002), Formal authorization allocation approaches for role-based access control based on relational algebra operations, in '3nd International Conference on Web Information Systems Engineering (WISE02)', Singapore, pp. 301--312.]]
    [17]
    Wang H. Sun L., Cao J., and Zhang Y. (2004), Anonymous access scheme for electronic-services, in 'Proceedings of the Twenty-Seventh Australasian Computer Science Conference (ACSC2004)', Dunedin, New Zealand, pp. 296--305.]]
    [18]
    Wang H., Zhang Y., Cao J., Kambayahsi Y. (2004), 'A global ticket-based access scheme for mobile users', Special Issue on Object-Oriented Client/Server Internet Environments, Information Systems Frontiers6(1), 35--46.]]
    [19]
    Wang H., Zhang Y., Cao J., Varadharajan V. (2003), 'Achieving secure and flexible m-services through tickets', IEEE Transactions on Systems, Man, and Cybernetics, Part A, Special issue on M-Services pp. 697--708.]]
    [20]
    Yiannis T. (1998), Fair off-line cash made easy, in 'Advances in Cryptology-Asiacrypt'98', Vol. 1346 of Lectures Notes in Computer Science, Springer-Verlag, pp. 240--252.]]

    Cited By

    View all
    • (2008)Protecting Information Sharing in Distributed Collaborative EnvironmentRevised Selected Papers of the APWeb 2008 International Workshops on Advanced Web and Network Technologies, and Applications - Volume 497710.5555/2964958.2964980(192-200)Online publication date: 26-Apr-2008
    • (2007)Secure and efficient information sharing in multi-university E-Learning environmentsProceedings of the 6th international conference on Advances in web based learning10.5555/2170285.2170343(542-553)Online publication date: 15-Aug-2007
    • (2006)A framework for role-based group deligation in distributed environmentsProceedings of the 29th Australasian Computer Science Conference - Volume 4810.5555/1151699.1151735(321-328)Online publication date: 1-Jan-2006
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image DL Hosted proceedings
    ACSC '05: Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38
    January 2005
    365 pages
    ISBN:1920682201

    Publisher

    Australian Computer Society, Inc.

    Australia

    Publication History

    Published: 01 January 2005

    Author Tags

    1. RBAC
    2. authorization
    3. mobility
    4. user-role relationship

    Qualifiers

    • Article

    Conference

    ACSC '05
    ACSC '05: Computer Science
    01 01 2005
    Newcastle, Australia

    Acceptance Rates

    Overall Acceptance Rate 136 of 379 submissions, 36%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)100
    • Downloads (Last 6 weeks)28
    Reflects downloads up to 12 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2008)Protecting Information Sharing in Distributed Collaborative EnvironmentRevised Selected Papers of the APWeb 2008 International Workshops on Advanced Web and Network Technologies, and Applications - Volume 497710.5555/2964958.2964980(192-200)Online publication date: 26-Apr-2008
    • (2007)Secure and efficient information sharing in multi-university E-Learning environmentsProceedings of the 6th international conference on Advances in web based learning10.5555/2170285.2170343(542-553)Online publication date: 15-Aug-2007
    • (2006)A framework for role-based group deligation in distributed environmentsProceedings of the 29th Australasian Computer Science Conference - Volume 4810.5555/1151699.1151735(321-328)Online publication date: 1-Jan-2006
    • (2006)Role-Based delegation with negative authorizationProceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development10.1007/11610113_28(307-318)Online publication date: 16-Jan-2006

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media