DocumentCode :
1976251
Title :
Detecting and resolving constraint conflicts in role-based access control
Author :
Jiong, Qiu ; Chen-hua, Ma
Author_Institution :
Coll. of Comput., Hangzhou Dianzi Univ., Hangzhou, China
fYear :
2011
fDate :
16-18 Sept. 2011
Firstpage :
5845
Lastpage :
5848
Abstract :
The focus of existing researches on RBAC constraints has been predominantly on the specification of constraints, the detection and resolution of constraint conflicts have been overlooked and remain a significant research challenge. To address these concerns, we propose a set of detection rules for these conflicts. Furthermore, a flexible approach is provided to resolve internal constraint conflicts by defining two new concepts, i.e., priority rule and resolution policy.
Keywords :
authorisation; constraint handling; RBAC constraints; detection rules; internal constraint conflicts; priority rule; resolution policy; role based access control; Authorization; Computational modeling; Image edge detection; Object oriented modeling; Unified modeling language; Conflict detection and Resolution; Constraint Conflict; Role-based Access Control;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Electrical and Control Engineering (ICECE), 2011 International Conference on
Conference_Location :
Yichang
Print_ISBN :
978-1-4244-8162-0
Type :
conf
DOI :
10.1109/ICECENG.2011.6057207
Filename :
6057207
Link To Document :
بازگشت