scholarly journals Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets

2015 ◽  
Vol 64 (9) ◽  
pp. 2490-2505 ◽  
Author(s):  
Dianxiang Xu ◽  
Michael Kent ◽  
Lijo Thomas ◽  
Tejeddine Mouelhi ◽  
Yves Le Traon
2011 ◽  
Vol 268-270 ◽  
pp. 1457-1461
Author(s):  
Ji Qiu Deng ◽  
Xiao Qing Luo ◽  
Huang Ling Gu

With the development of WebGIS, it plays a more and more important role in government and enterprises. The effective way to access and control spatial data, because of relating to the security and business secrets of government and enterprises, becomes an urgent concern for them. Now, RBAC (Role Based Access Control) can be a valid method to access and control uniform resource, but it is lack of flexibility and real-time ability to control spatial data in WebGIS. For that, this paper proposes G-RBAC model based on RBAC model to enhance the flexibility and real-time ability to access spatial data.


2016 ◽  
Vol 2016 ◽  
pp. 1-8 ◽  
Author(s):  
Lixia Xie ◽  
Chong Wang

In order to solve the problem of access control among different security domains in cloud networks, this paper presents an access control model based on role and trust-degree. The model combines role-based access control and trust-based access control. The role assessment weights are defined based on the user’s role classes, and the trust-degree is calculated according to the role assessment weights and the role’s behavior. In order to increase the accuracy of access control, the model gives the concept and calculation methods of feedback trust-degree. To achieve fine-grained access control, the model introduces direct trust-degree, recommendation trust-degree, and feedback trust-degree, all of which participate in comprehensive trust-degree by adjusting their weights. A simulation experiment was conducted in the LAN environment, and a web system was used to construct an access control model with multisecurity domains in the experiment. The experimental results demonstrate that our model has higher security, expansibility, and flexibility.


2012 ◽  
Vol 601 ◽  
pp. 307-311 ◽  
Author(s):  
Jia An ◽  
Shu Zhen Yao ◽  
Liang Zhang

Task-role-based access control (TRBAC) model widely used in workflow does not support the delegation strategies and does not consider the characteristics of entities in the system. In order to meet the requirements of delegation in the workflow environment, this paper proposes a delegation model called TRBAC-and-Attribute-based Delegation (TRABD) model. TRABD model introduces the concept of delegation and attribute to TRBAC model. To improve the security of the delegation process, delegation constraints in TRABD model consist of not only delegation condition role (CR), but also attribute constraint (ATC), delegation-role constraint (DRC), delegation constraint (DC). For better flexibility, ATC is divided into three types: strict ATC, weak ATC and user-defined ATC, so that the delegator can temporarily delegate high level permission to low level delegatee. In addition to this, it maintains the advantagement of traditional TRBAC model.


Sign in / Sign up

Export Citation Format

Share Document