Title :
I-RBAC: An Identity& Role Based Access Control Model
Author :
Wang, Jin ; Li, Qiang ; Li, Daxing
Author_Institution :
Shandong Univ., Jinan
fDate :
May 30 2007-June 1 2007
Abstract :
Role-based Access Control (RBAC) provides an efficient means of managing authorization of the system resources. In the implementation phase, access control should be strong and efficient based on user authentication information, so the RBAC mechanism commonly requires authentication as a prerequisite. By cooperating with identity-based cryptography, this paper first presents an identity& role based access control (I-RBAC) model which supports user´s authentication internally. In our model, both aspect of user authentication and role-based authorization can be verified by a user´s signature simultaneously. An implementation method of I-RBAC is also presented using a variant of an ID-based signature scheme due to Cha and Cheon.
Keywords :
authorisation; cryptography; digital signatures; ID-based signature scheme; identity-based cryptography; role based access control; system resources authorization; user authentication information; user signature; Access control; Authentication; Authorization; Automatic control; Identity-based encryption; Information security; Permission; Public key; Public key cryptography; Resource management; Role; identity-based cryptography; role-based access control;
Conference_Titel :
Control and Automation, 2007. ICCA 2007. IEEE International Conference on
Conference_Location :
Guangzhou
Print_ISBN :
978-1-4244-0817-7
Electronic_ISBN :
978-1-4244-0818-4
DOI :
10.1109/ICCA.2007.4376922