Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security 2007
DOI: 10.1145/1229285.1229306
|View full text |Cite
|
Sign up to set email alerts
|

Managing RBAC states with transitive relations

Abstract: In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that express and remove redundancy from a component, a RBAC state, and from conflict constraints. The transitive closure relations on a RBAC state specify the reachability among user groups, roles and from user groups to roles. These relations can assist the process of authorization and make some queries easier to answer. Paper [17] shows … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…The remaining 13 publications define conflict reduction algorithms. Both Pang et al (2007) and Shafiq et al (2012) propose graph optimization algorithms to remove constraint conflicts on an RBAC state. The remaining eleven publications propose algorithms for the reduction of rule conflicts in an XACML policy set.…”
Section: Reduce Conflictsmentioning
confidence: 99%
“…The remaining 13 publications define conflict reduction algorithms. Both Pang et al (2007) and Shafiq et al (2012) propose graph optimization algorithms to remove constraint conflicts on an RBAC state. The remaining eleven publications propose algorithms for the reduction of rule conflicts in an XACML policy set.…”
Section: Reduce Conflictsmentioning
confidence: 99%
“…Information 2020, 11, x FOR PEER REVIEW 14 of 24 of the behavioral requirements of traditional roles is mostly identified to contain multiplicity of roles, unclear role definitions, and conflicting roles. As explained by [87], it is appropriate to optimize the roles sets so that only authentic users are assigned permissions to use the system. The effects of role ambiguity, role conflict, or role strain can influence the user of a role to abuse access rights.…”
Section: The Precursors Of Rbacmentioning
confidence: 99%