DocumentCode :
2986998
Title :
A Trust and Unauthorized Operation Based RBAC (TUORBAC) Model
Author :
Wei Chang ; Feng Xu ; Jianping Dou
Author_Institution :
Coll. of Comput. Sci. & Technol., Nanjing Univ. of Aeronaut. & Astronaut., Nanjing, China
fYear :
2012
fDate :
7-9 Dec. 2012
Firstpage :
811
Lastpage :
814
Abstract :
This paper introduces trust and unauthorized operation to traditional RBAC model, and proposes a trust and unauthorized operation based RBAC model (TUORBAC model). The model has greatly improved in safety compared to traditional RBAC model. Before user activates the roles, TUORBAC model downgrade the roles of user according to the average severity of user historical unauthorized operation. When the average severity of user historical unauthorized operation is high, we directly downgrade roles of user to the lowest. Otherwise, we calculate the value of trust, and downgrade the roles of user according to the value of trust, finally activate downgrade roles. In addition, the model introduces downgrade roles, which stored downgrade roles of user. If downgrade roles are nonempty, we directly activate downgrade roles without re-judged, which improves the efficiency of the system.
Keywords :
authorisation; trusted computing; RBAC model; TUORBAC model; historical unauthorized operation; role-based access control; trust operation; unauthorized operation; Access control; Computational modeling; Educational institutions; Equations; History; Mathematical model; Safety; RBAC model; roles; safety; trust; unauthorized operation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Control Engineering and Communication Technology (ICCECT), 2012 International Conference on
Conference_Location :
Liaoning
Print_ISBN :
978-1-4673-4499-9
Type :
conf
DOI :
10.1109/ICCECT.2012.217
Filename :
6413988
Link To Document :
بازگشت