Title :
A Trust and Unauthorized Operation Based RBAC (TUORBAC) Model
Author :
Wei Chang ; Feng Xu ; Jianping Dou
Author_Institution :
Coll. of Comput. Sci. & Technol., Nanjing Univ. of Aeronaut. & Astronaut., Nanjing, China
Abstract :
This paper introduces trust and unauthorized operation to traditional RBAC model, and proposes a trust and unauthorized operation based RBAC model (TUORBAC model). The model has greatly improved in safety compared to traditional RBAC model. Before user activates the roles, TUORBAC model downgrade the roles of user according to the average severity of user historical unauthorized operation. When the average severity of user historical unauthorized operation is high, we directly downgrade roles of user to the lowest. Otherwise, we calculate the value of trust, and downgrade the roles of user according to the value of trust, finally activate downgrade roles. In addition, the model introduces downgrade roles, which stored downgrade roles of user. If downgrade roles are nonempty, we directly activate downgrade roles without re-judged, which improves the efficiency of the system.
Keywords :
authorisation; trusted computing; RBAC model; TUORBAC model; historical unauthorized operation; role-based access control; trust operation; unauthorized operation; Access control; Computational modeling; Educational institutions; Equations; History; Mathematical model; Safety; RBAC model; roles; safety; trust; unauthorized operation;
Conference_Titel :
Control Engineering and Communication Technology (ICCECT), 2012 International Conference on
Conference_Location :
Liaoning
Print_ISBN :
978-1-4673-4499-9
DOI :
10.1109/ICCECT.2012.217